First published: Fri Jun 25 2021(Updated: )
An information disclosure flaw exists in the ARM SIGPAGE functionality of the Linux kernel. An attacker with a local account can read the contents of the sigpage, which contains previously initialized kernel memory contents. This flaw requires an attacker to read a process’s memory at a specific offset to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =5.4.54 | |
Linux Linux kernel | =5.4.66 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
Oracle Communications Cloud Native Core Policy | =22.2.0 | |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21781 is an information disclosure vulnerability in the ARM SIGPAGE functionality of the Linux kernel.
CVE-2021-21781 has a severity level of medium (4 out of 10).
CVE-2021-21781 affects Linux Kernel versions 5.4.66 and 5.4.54.
An attacker can exploit CVE-2021-21781 by using a userland application to read the contents of the sigpage, which can leak kernel memory contents.
Yes, there are fixes available for CVE-2021-21781. Please refer to the references for more information.