[USN-4979-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2020-25670)
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly deallocate memory in certain error
situations. A local attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly handle error conditions in some situations,
leading to an infinite loop. A local attacker could use this to cause a
denial of service. (CVE-2020-25673)
It was discovered that the Realtek RTL8188EU Wireless device driver in the
Linux kernel did not properly validate ssid lengths in some situations. An
attacker could use this to cause a denial of service (system crash).
(CVE-2021-28660)
Zygo Blaxell discovered that the btrfs file system implementation in the
Linux kernel contained a race condition during certain cloning operations.
A local attacker could possibly use this to cause a denial of service
(system crash). (CVE-2021-28964)
Vince Weaver discovered that the perf subsystem in the Linux kernel did not
properly handle certain PEBS records properly for some Intel Haswell
processors. A local attacker could use this to cause a denial of service
(system crash). (CVE-2021-28971)
It was discovered that the RPA PCI Hotplug driver implementation in the
Linux kernel did not properly handle device name writes via sysfs, leading
to a buffer overflow. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2021-28972)
It was discovered that the Qualcomm IPC router implementation in the Linux
kernel did not properly initialize memory passed to user space. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-29647)
Dan Carpenter discovered that the block device manager (dm) implementation
in the Linux kernel contained a buffer overflow in the ioctl for listing
devices. A privileged local attacker could use this to cause a denial of
service (system crash). (CVE-2021-31916)
It was discovered that the CIPSO implementation in the Linux kernel did not
properly perform reference counting in some situations, leading to use-
after-free vulnerabilities. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33033)
Wolfgang Frisch discovered that the ext4 file system implementation in the
Linux kernel contained an integer overflow when handling metadata inode
extents. An attacker could use this to construct a malicious ext4 file
system image that, when mounted, could cause a denial of service (system
crash). (CVE-2021-3428)
马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3483)
- ID
- USN-4979-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4979-1
- Published
-
2021-06-04T19:04:17
(3 years ago) - Modified
-
2021-06-04T19:04:17
(3 years ago) - Other Advisories
-
- ALAS-2021-1503
- ALAS2-2021-1627
- ALSA-2021:4356
- ASB-A-184622099
- ELSA-2021-2725
- ELSA-2021-4356
- ELSA-2021-9215
- ELSA-2021-9220
- ELSA-2021-9221
- ELSA-2021-9222
- ELSA-2021-9223
- ELSA-2021-9305
- ELSA-2021-9306
- ELSA-2021-9307
- ELSA-2021-9308
- ELSA-2021-9346
- ELSA-2021-9349
- ELSA-2021-9351
- ELSA-2021-9362
- ELSA-2021-9363
- ELSA-2021-9407
- ELSA-2021-9410
- FEDORA-2021-1c170a7c7c
- FEDORA-2021-21360476b6
- FEDORA-2021-2306e89112
- FEDORA-2021-41fb54ae9f
- FEDORA-2021-68b0dd2373
- FEDORA-2021-6b0f287b8b
- FEDORA-2021-9503fffad9
- FEDORA-2021-bb755ed5e3
- FEDORA-2021-d56567bdab
- FEDORA-2021-e636ce53df
- MS:CVE-2020-25672
- MS:CVE-2021-28660
- MS:CVE-2021-28964
- MS:CVE-2021-28971
- MS:CVE-2021-28972
- MS:CVE-2021-29647
- MS:CVE-2021-31916
- MS:CVE-2021-33033
- MS:CVE-2021-3483
- openSUSE-SU-2021:0532-1
- openSUSE-SU-2021:0579-1
- openSUSE-SU-2021:0758-1
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:1501-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:3641-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3806-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2021:3941-1
- RHSA-2021:1578
- RHSA-2021:1739
- RHSA-2021:2725
- RHSA-2021:2726
- RHSA-2021:4140
- RHSA-2021:4356
- SSA:2021-202-01
- SUSE-SU-2021:1175-1
- SUSE-SU-2021:1176-1
- SUSE-SU-2021:1177-1
- SUSE-SU-2021:1210-1
- SUSE-SU-2021:1211-1
- SUSE-SU-2021:1238-1
- SUSE-SU-2021:1248-1
- SUSE-SU-2021:1266-1
- SUSE-SU-2021:1301-1
- SUSE-SU-2021:1365-1
- SUSE-SU-2021:1395-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1617-1
- SUSE-SU-2021:1623-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1625-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2198-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2021:3641-1
- SUSE-SU-2021:3642-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3748-1
- SUSE-SU-2021:3806-1
- SUSE-SU-2021:3807-1
- SUSE-SU-2021:3848-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3877-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3933-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3941-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2021:3978-1
- SUSE-SU-2021:3979-1
- SUSE-SU-2021:3992-1
- SUSE-SU-2022:0234-1
- SUSE-SU-2022:0243-1
- SUSE-SU-2022:0255-1
- SUSE-SU-2022:0263-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0296-1
- SUSE-SU-2022:0325-1
- USN-4945-1
- USN-4945-2
- USN-4948-1
- USN-4977-1
- USN-4982-1
- USN-4984-1
- USN-4999-1
- USN-5137-1
- USN-5137-2
- USN-5299-1
- USN-5343-1
- USN-5361-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=bionic | ubuntu | linux-image-virtual | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=xenial | ubuntu | linux-image-virtual-hwe-16.04 | < 4.15.0.144.140 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04 | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-virtual-hwe-16.04-edge | < 4.15.0.144.140 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-virtual-hwe-16.04-edge | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=bionic | ubuntu | linux-image-snapdragon | < 4.15.0.1103.106 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-raspi2?distro=bionic | ubuntu | linux-image-raspi2 | < 4.15.0.1086.83 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-oracle?distro=xenial | ubuntu | linux-image-oracle | < 4.15.0.1072.60 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-oracle-lts-18.04?distro=bionic | ubuntu | linux-image-oracle-lts-18.04 | < 4.15.0.1072.82 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-oem?distro=xenial | ubuntu | linux-image-oem | < 4.15.0.144.140 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=bionic | ubuntu | linux-image-lowlatency | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=xenial | ubuntu | linux-image-lowlatency-hwe-16.04 | < 4.15.0.144.140 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04 | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-lowlatency-hwe-16.04-edge | < 4.15.0.144.140 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-lowlatency-hwe-16.04-edge | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=bionic | ubuntu | linux-image-kvm | < 4.15.0.1092.88 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gke?distro=xenial | ubuntu | linux-image-gke | < 4.15.0.1100.101 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=bionic | ubuntu | linux-image-generic | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=bionic | ubuntu | linux-image-generic-lpae | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04 | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-lpae-hwe-16.04-edge | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=xenial | ubuntu | linux-image-generic-hwe-16.04 | < 4.15.0.144.140 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=bionic | ubuntu | linux-image-generic-hwe-16.04 | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=xenial | ubuntu | linux-image-generic-hwe-16.04-edge | < 4.15.0.144.140 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=bionic | ubuntu | linux-image-generic-hwe-16.04-edge | < 4.15.0.144.131 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=xenial | ubuntu | linux-image-gcp | < 4.15.0.1100.101 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-gcp-lts-18.04?distro=bionic | ubuntu | linux-image-gcp-lts-18.04 | < 4.15.0.1100.118 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-azure?distro=xenial | ubuntu | linux-image-azure | < 4.15.0.1115.106 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-azure?distro=trusty | ubuntu | linux-image-azure | < 4.15.0.1115.88 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-azure-lts-18.04?distro=bionic | ubuntu | linux-image-azure-lts-18.04 | < 4.15.0.1115.88 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-azure-edge?distro=xenial | ubuntu | linux-image-azure-edge | < 4.15.0.1115.106 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws-lts-18.04?distro=bionic | ubuntu | linux-image-aws-lts-18.04 | < 4.15.0.1103.106 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-aws-hwe?distro=xenial | ubuntu | linux-image-aws-hwe | < 4.15.0.1103.94 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-144-lowlatency?distro=xenial | ubuntu | linux-image-4.15.0-144-lowlatency | < 4.15.0-144.148~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-144-lowlatency?distro=bionic | ubuntu | linux-image-4.15.0-144-lowlatency | < 4.15.0-144.148 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-144-generic?distro=xenial | ubuntu | linux-image-4.15.0-144-generic | < 4.15.0-144.148~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-144-generic?distro=bionic | ubuntu | linux-image-4.15.0-144-generic | < 4.15.0-144.148 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-144-generic-lpae?distro=bionic | ubuntu | linux-image-4.15.0-144-generic-lpae | < 4.15.0-144.148 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1115-azure?distro=xenial | ubuntu | linux-image-4.15.0-1115-azure | < 4.15.0-1115.128~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1115-azure?distro=trusty | ubuntu | linux-image-4.15.0-1115-azure | < 4.15.0-1115.128~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1115-azure?distro=bionic | ubuntu | linux-image-4.15.0-1115-azure | < 4.15.0-1115.128 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1103-snapdragon?distro=bionic | ubuntu | linux-image-4.15.0-1103-snapdragon | < 4.15.0-1103.112 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1103-aws?distro=xenial | ubuntu | linux-image-4.15.0-1103-aws | < 4.15.0-1103.110~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1103-aws?distro=bionic | ubuntu | linux-image-4.15.0-1103-aws | < 4.15.0-1103.110 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1100-gcp?distro=xenial | ubuntu | linux-image-4.15.0-1100-gcp | < 4.15.0-1100.113~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1100-gcp?distro=bionic | ubuntu | linux-image-4.15.0-1100-gcp | < 4.15.0-1100.113 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1092-kvm?distro=bionic | ubuntu | linux-image-4.15.0-1092-kvm | < 4.15.0-1092.94 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1086-raspi2?distro=bionic | ubuntu | linux-image-4.15.0-1086-raspi2 | < 4.15.0-1086.91 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1072-oracle?distro=xenial | ubuntu | linux-image-4.15.0-1072-oracle | < 4.15.0-1072.80~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1072-oracle?distro=bionic | ubuntu | linux-image-4.15.0-1072-oracle | < 4.15.0-1072.80 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |