{"dataType": "CVE_RECORD", "containers": {"adp": [{"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"medium\"}"}}}], "affected": [{"vendor": "canonical", "product": "linux-aws-5.0", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-5.3", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-5.4", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-4.15", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-5.3", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-5.4", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-dell300x", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-4.15", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-5.3", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-5.4", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gke-4.15", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gke-5.0", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gke-5.3", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gke-5.4", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gkeop-5.4", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-5.4", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-ibm-5.4", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-osp1", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-5.0", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-5.3", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-5.4", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-raspi-5.4", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-raspi2-5.3", "platforms": ["bionic"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux", "platforms": ["bionic", "focal", "jammy", "noble", "trusty", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws", "platforms": ["bionic", "focal", "jammy", "noble", "trusty", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure", "platforms": ["bionic", "focal", "jammy", "noble", "trusty", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp", "platforms": ["bionic", "focal", "jammy", "noble", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle", "platforms": ["bionic", "focal", "jammy", "noble", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-kvm", "platforms": ["bionic", "focal", "jammy", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-raspi2", "platforms": ["bionic", "focal", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe", "platforms": ["bionic", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem", "platforms": ["bionic", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-snapdragon", "platforms": ["bionic", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-5.11", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-5.13", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-5.8", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-5.11", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-5.13", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-5.8", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-fde-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-bluefield", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-5.11", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-5.13", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-5.8", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gke-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gkeop-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-5.11", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-5.13", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-5.8", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-ibm-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-intel-5.13", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-intel-iotg-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-iot", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-lowlatency-hwe-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-nvidia-tegra-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-5.10", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-5.13", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-5.14", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-5.6", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-5.11", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-5.13", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-5.15", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-5.8", "platforms": ["focal"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-xilinx-zynqmp", "platforms": ["focal", "jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-fde", "platforms": ["focal", "jammy", "noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gkeop", "platforms": ["focal", "jammy", "noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-ibm", "platforms": ["focal", "jammy", "noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-raspi", "platforms": ["focal", "jammy", "noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gke", "platforms": ["focal", "jammy", "noble", "xenial"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-allwinner-5.19", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-5.19", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-6.2", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-6.5", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-6.8", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-5.19", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-6.2", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-6.5", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-6.8", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-fde-5.19", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-fde-6.2", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-fde-6.8", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-5.19", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-6.2", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-6.5", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-6.8", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-5.19", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-6.2", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-6.5", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-6.8", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-ibm-6.8", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-intel-iot-realtime", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-intel-iotg", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-lowlatency-hwe-5.19", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-lowlatency-hwe-6.2", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-lowlatency-hwe-6.5", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-lowlatency-hwe-6.8", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-nvidia-6.2", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-nvidia-6.5", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-nvidia-6.8", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-nvidia-tegra-igx", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-5.17", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-6.0", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-6.1", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-6.5", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-6.5", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-6.8", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-starfive-5.19", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-starfive-6.2", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-starfive-6.5", "platforms": ["jammy"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-lowlatency", "platforms": ["jammy", "noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-nvidia", "platforms": ["jammy", "noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-nvidia-tegra", "platforms": ["jammy", "noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-realtime", "platforms": ["jammy", "noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-6.14", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-6.17", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-6.11", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-6.14", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-6.17", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-fde-6.14", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-fde-6.17", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-nvidia", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-azure-nvidia-6.14", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-6.11", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-6.14", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-gcp-6.17", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-6.11", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-6.14", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-hwe-6.17", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-lowlatency-hwe-6.11", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-nvidia-6.11", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-nvidia-lowlatency", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-6.11", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-6.14", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-6.17", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oem-6.8", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-6.14", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-oracle-6.17", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-raspi-realtime", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-xilinx", "platforms": ["noble"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-lts-xenial", "platforms": ["trusty"], "defaultStatus": "affected"}, {"vendor": "canonical", "product": "linux-aws-hwe", "platforms": ["xenial"], "defaultStatus": "affected"}], "references": [{"url": "https://ubuntu.com/security/CVE-2021-3773"}, {"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"}], "descriptions": [{"lang": "en", "value": "A flaw in netfilter could allow a network-connected attacker to inferopenvpn connection endpoint information for further use in traditionalnetwork attacks."}], "providerMetadata": {"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical", "dateUpdated": "2022-02-16T19:15:00Z", "x_subShortName": "canonical"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "redhat", "product": "kernel", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-abi-whitelists", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-bootwrapper", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-debug", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-debug-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-doc", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-firmware", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-headers", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-kdump", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-kdump-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "perf", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "python-perf", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2021-3773"}], "descriptions": [{"lang": "en", "value": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks. \n            \n            Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2021-09-08T00:00:00Z", "x_subShortName": "redhat_6"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "redhat", "product": "bpftool", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-abi-whitelists", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-bootwrapper", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-debug", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-debug-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-doc", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-headers", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-kdump", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-kdump-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt-debug", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt-debug-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt-debug-kvm", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt-doc", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt-kvm", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt-trace", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt-trace-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-rt-trace-kvm", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-tools", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-tools-libs", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "kernel-tools-libs-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "perf", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "python-perf", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2021-3773"}], "descriptions": [{"lang": "en", "value": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks. \n            \n            Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2021-09-08T00:00:00Z", "x_subShortName": "redhat_7"}}, {"credits": [{"lang": "en", "value": "packager@almalinux.org"}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "almalinux", "product": "bpftool", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-abi-stablelists", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-cross-headers", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-debug", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-debug-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-debug-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-debug-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-debug-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-doc", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-headers", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-tools-libs", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-tools-libs-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-zfcpdump", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-zfcpdump-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-zfcpdump-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-zfcpdump-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "kernel-zfcpdump-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "perf", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "python3-perf", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2021-3773", "name": "CVE-2021-3773"}], "descriptions": [{"lang": "en", "value": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\nSecurity Fix(es):\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAdditional Changes:\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000001", "shortName": "almalinux", "dateUpdated": "2022-05-10T00:00:00Z", "x_subShortName": "alma_8"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"medium\"}"}}}], "affected": [{"vendor": "fedora", "product": "kernel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.15.15-100.fc34", "versionType": "rpm"}], "platforms": ["cpe:/o:fedoraproject:fedora:34"], "defaultStatus": "unaffected"}, {"vendor": "fedora", "product": "kernel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.15.15-200.fc35", "versionType": "rpm"}], "platforms": ["cpe:/o:fedoraproject:fedora:35"], "defaultStatus": "unaffected"}], "references": [{"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2022-a23dd56848"}, {"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2022-b7ef5c55da"}], "descriptions": [{"lang": "en", "value": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"}], "providerMetadata": {"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora", "dateUpdated": "2022-01-20T08:31:04Z", "x_subShortName": "fedora"}}, {"metrics": [{"cvssV3_0": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"IMPORTANT\"}"}}}], "affected": [{"vendor": "oraclelinux", "product": "bpftool", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-abi-stablelists", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-cross-headers", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-debug", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-debug-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-debug-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-debug-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-debug-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-doc", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-headers", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-tools-libs", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "kernel-tools-libs-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "perf", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "python3-perf", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}], "references": [{"url": "https://linux.oracle.com/cve/CVE-2021-3773.html"}], "descriptions": [{"lang": "en", "value": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000006", "shortName": "oraclelinux", "dateUpdated": "2022-05-17T00:00:00Z", "x_subShortName": "oraclelinux"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "redhat", "product": "bpftool", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-abi-stablelists", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-doc", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-kvm", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-kvm", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-tools-libs", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-tools-libs-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "perf", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "python3-perf", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/errata/RHSA-2022:1975"}, {"url": "https://access.redhat.com/errata/RHSA-2022:1988"}, {"url": "https://access.redhat.com/security/cve/CVE-2021-3773"}], "descriptions": [{"lang": "en", "value": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section."}, {"lang": "en", "value": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2021-09-08T00:00:00Z", "x_subShortName": "redhat_8"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "redhat", "product": "bpftool", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-debug", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-debug-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-debug-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-debug-devel-matched", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-debug-modules", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-debug-modules-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-debug-modules-extra", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-debug-modules-internal", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-debug-modules-partner", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-devel-matched", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-modules", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-modules-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-modules-extra", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-modules-internal", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-64k-modules-partner", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-abi-stablelists", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-cross-headers", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-devel-matched", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-modules", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-modules-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-modules-extra", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-modules-internal", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-modules-partner", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-debug-uki-virt", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-devel-matched", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-doc", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-headers", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-ipaclones-internal", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-modules", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-modules-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-modules-extra", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-modules-internal", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-modules-partner", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-devel-matched", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-kvm", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-modules", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-modules-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-modules-extra", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-modules-internal", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-debug-modules-partner", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-devel-matched", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-kvm", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-modules", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-modules-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-modules-extra", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-modules-internal", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-rt-modules-partner", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-selftests-internal", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-tools", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-tools-libs", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-tools-libs-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-uki-virt", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-uki-virt-addons", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-devel-matched", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-modules", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-modules-core", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-modules-extra", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-modules-internal", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "kernel-zfcpdump-modules-partner", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "libperf", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "perf", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "python3-perf", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "rtla", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "rv", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2021-3773"}], "descriptions": [{"lang": "en", "value": "Red Hat's versions of the associated software have been determined to NOT be affected by CVE-2021-3773."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2021-09-08T00:00:00Z", "x_subShortName": "redhat_9"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "rocky", "product": "bpftool", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "bpftool-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-abi-stablelists", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-cross-headers", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-debug", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-debug-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-debug-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-debug-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-debug-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-debug-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-debuginfo-common-aarch64", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-debuginfo-common-x86_64", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-doc", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-headers", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-debug", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-debug-core", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-debug-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-debug-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-debug-kvm", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-debug-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-debug-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-debuginfo-common-x86_64", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-kvm", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-modules", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-rt-modules-extra", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.rt7.166.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-tools-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-tools-libs", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "kernel-tools-libs-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "perf", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "perf-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "python3-perf", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "python3-perf-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:4.18.0-372.9.1.el8", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}], "references": [{"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888433"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903578"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905749"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957375"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981950"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983894"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994390"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997338"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009312"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009521"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011104"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015525"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015755"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017073"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017796"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022814"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030476"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031200"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042798"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043453"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046021"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048251"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"}], "descriptions": [{"lang": "en", "value": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)"}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000004", "shortName": "rocky", "dateUpdated": "2022-05-10T06:42:36Z", "x_subShortName": "rocky"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Medium\"}"}}}], "affected": [{"vendor": "arch", "product": "openvpn", "versions": [{"status": "affected", "version": "2.5.5-1"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://security.archlinux.org/CVE-2021-3773"}], "descriptions": [{"lang": "en", "value": "OpenVPN’s use of Netfilter makes it susceptible to several attacks that can cause denial-of-service, deanonymization of clients, or redirection of a victim client connection to an attacker controlled server."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000002", "shortName": "arch", "dateUpdated": "2021-09-09T13:04:14.000Z", "x_subShortName": "arch"}}], "cna": {"metrics": [{"format": "CVSS", "cvssV2_0": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}}, {"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*"], "vendor": "oracle", "product": "communications_cloud_native_core_binding_support_function", "versions": [{"status": "affected", "version": "22.1.3"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*"], "vendor": "oracle", "product": "communications_cloud_native_core_network_exposure_function", "versions": [{"status": "affected", "version": "22.1.1"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"], "vendor": "oracle", "product": "communications_cloud_native_core_policy", "versions": [{"status": "affected", "version": "22.2.0"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"], "vendor": "fedoraproject", "product": "fedora", "versions": [{"status": "affected", "version": "34"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"], "vendor": "linux", "product": "linux_kernel", "versions": [{"status": "affected", "version": "0", "lessThan": "5.14", "versionType": "custom"}, {"status": "affected", "version": "5.15", "lessThan": "5.15.15", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux", "versions": [{"status": "affected", "version": "6.0"}, {"status": "affected", "version": "7.0"}, {"status": "affected", "version": "8.0"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949", "tags": ["issue-tracking", "third-party-advisory"]}, {"url": "https://www.oracle.com/security-alerts/cpujul2022.html", "tags": ["patch", "third-party-advisory"]}, {"url": "https://citizenlab.ca/2024/07/vulnerabilities-in-vpns-paper-presented-at-the-privacy-enhancing-technologies-symposium-2024/"}, {"url": "https://security.netapp.com/advisory/ntap-20250328-0004/"}], "descriptions": [{"lang": "en", "value": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks."}, {"lang": "es", "value": "Un fallo en netfilter podría permitir a un atacante conectado a la red inferir información del endpoint de la conexión openvpn para su posterior uso en ataques de red tradicionales"}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-200", "description": "CWE-200"}, {"lang": "en", "description": "NVD-CWE-noinfo"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2022-02-16T19:15:08Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2021-3773", "state": "PUBLISHED", "dateUpdated": "2025-03-28T15:15:41Z", "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "datePublished": "2022-02-16T19:15:08Z", "assignerShortName": "redhat"}, "dataVersion": "5.0"}