Link | Resource |
---|---|
https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb | Patch Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2021-3996 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2024628 | Issue Tracking Patch |
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes | Release Notes Vendor Advisory |
https://www.openwall.com/lists/oss-security/2022/01/24/2 | Exploit Mailing List |
http://www.openwall.com/lists/oss-security/2022/11/30/2 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2022/Dec/4 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221209-0002/ | Broken Link Third Party Advisory |
Configuration 1
|
Published : 2022-08-23 08:15
Updated : 2023-01-26 08:38
NVD link : CVE-2021-3996
Mitre link : CVE-2021-3996