An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process’s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243 | Exploit Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2021-08-18 08:15
Updated : 2023-02-03 06:31
NVD link : CVE-2021-21781
Mitre link : CVE-2021-21781
JSON object : View
CWE
CWE-908
Use of Uninitialized Resource
Products Affected
oracle
- communications_cloud_native_core_binding_support_function
- communications_cloud_native_core_network_exposure_function
- communications_cloud_native_core_policy
linux
- linux_kernel