[USN-4979-1] Linux kernel vulnerabilities

Severity Medium
Affected Packages 50
CVEs 13

Several security issues were fixed in the Linux kernel.

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2020-25670)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly deallocate memory in certain error
situations. A local attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly handle error conditions in some situations,
leading to an infinite loop. A local attacker could use this to cause a
denial of service. (CVE-2020-25673)

It was discovered that the Realtek RTL8188EU Wireless device driver in the
Linux kernel did not properly validate ssid lengths in some situations. An
attacker could use this to cause a denial of service (system crash).
(CVE-2021-28660)

Zygo Blaxell discovered that the btrfs file system implementation in the
Linux kernel contained a race condition during certain cloning operations.
A local attacker could possibly use this to cause a denial of service
(system crash). (CVE-2021-28964)

Vince Weaver discovered that the perf subsystem in the Linux kernel did not
properly handle certain PEBS records properly for some Intel Haswell
processors. A local attacker could use this to cause a denial of service
(system crash). (CVE-2021-28971)

It was discovered that the RPA PCI Hotplug driver implementation in the
Linux kernel did not properly handle device name writes via sysfs, leading
to a buffer overflow. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2021-28972)

It was discovered that the Qualcomm IPC router implementation in the Linux
kernel did not properly initialize memory passed to user space. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-29647)

Dan Carpenter discovered that the block device manager (dm) implementation
in the Linux kernel contained a buffer overflow in the ioctl for listing
devices. A privileged local attacker could use this to cause a denial of
service (system crash). (CVE-2021-31916)

It was discovered that the CIPSO implementation in the Linux kernel did not
properly perform reference counting in some situations, leading to use-
after-free vulnerabilities. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33033)

Wolfgang Frisch discovered that the ext4 file system implementation in the
Linux kernel contained an integer overflow when handling metadata inode
extents. An attacker could use this to construct a malicious ext4 file
system image that, when mounted, could cause a denial of service (system
crash). (CVE-2021-3428)

马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3483)

Package Affected Version
pkg:deb/ubuntu/linux-image-virtual?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=xenial < 4.15.0.144.140
pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=xenial < 4.15.0.144.140
pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-snapdragon?distro=bionic < 4.15.0.1103.106
pkg:deb/ubuntu/linux-image-raspi2?distro=bionic < 4.15.0.1086.83
pkg:deb/ubuntu/linux-image-oracle?distro=xenial < 4.15.0.1072.60
pkg:deb/ubuntu/linux-image-oracle-lts-18.04?distro=bionic < 4.15.0.1072.82
pkg:deb/ubuntu/linux-image-oem?distro=xenial < 4.15.0.144.140
pkg:deb/ubuntu/linux-image-lowlatency?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=xenial < 4.15.0.144.140
pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=xenial < 4.15.0.144.140
pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-kvm?distro=bionic < 4.15.0.1092.88
pkg:deb/ubuntu/linux-image-gke?distro=xenial < 4.15.0.1100.101
pkg:deb/ubuntu/linux-image-generic?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-generic-lpae?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=xenial < 4.15.0.144.140
pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=xenial < 4.15.0.144.140
pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=bionic < 4.15.0.144.131
pkg:deb/ubuntu/linux-image-gcp?distro=xenial < 4.15.0.1100.101
pkg:deb/ubuntu/linux-image-gcp-lts-18.04?distro=bionic < 4.15.0.1100.118
pkg:deb/ubuntu/linux-image-azure?distro=xenial < 4.15.0.1115.106
pkg:deb/ubuntu/linux-image-azure?distro=trusty < 4.15.0.1115.88
pkg:deb/ubuntu/linux-image-azure-lts-18.04?distro=bionic < 4.15.0.1115.88
pkg:deb/ubuntu/linux-image-azure-edge?distro=xenial < 4.15.0.1115.106
pkg:deb/ubuntu/linux-image-aws-lts-18.04?distro=bionic < 4.15.0.1103.106
pkg:deb/ubuntu/linux-image-aws-hwe?distro=xenial < 4.15.0.1103.94
pkg:deb/ubuntu/linux-image-4.15.0-144-lowlatency?distro=xenial < 4.15.0-144.148~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-144-lowlatency?distro=bionic < 4.15.0-144.148
pkg:deb/ubuntu/linux-image-4.15.0-144-generic?distro=xenial < 4.15.0-144.148~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-144-generic?distro=bionic < 4.15.0-144.148
pkg:deb/ubuntu/linux-image-4.15.0-144-generic-lpae?distro=bionic < 4.15.0-144.148
pkg:deb/ubuntu/linux-image-4.15.0-1115-azure?distro=xenial < 4.15.0-1115.128~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1115-azure?distro=trusty < 4.15.0-1115.128~14.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1115-azure?distro=bionic < 4.15.0-1115.128
pkg:deb/ubuntu/linux-image-4.15.0-1103-snapdragon?distro=bionic < 4.15.0-1103.112
pkg:deb/ubuntu/linux-image-4.15.0-1103-aws?distro=xenial < 4.15.0-1103.110~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1103-aws?distro=bionic < 4.15.0-1103.110
pkg:deb/ubuntu/linux-image-4.15.0-1100-gcp?distro=xenial < 4.15.0-1100.113~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1100-gcp?distro=bionic < 4.15.0-1100.113
pkg:deb/ubuntu/linux-image-4.15.0-1092-kvm?distro=bionic < 4.15.0-1092.94
pkg:deb/ubuntu/linux-image-4.15.0-1086-raspi2?distro=bionic < 4.15.0-1086.91
pkg:deb/ubuntu/linux-image-4.15.0-1072-oracle?distro=xenial < 4.15.0-1072.80~16.04.1
pkg:deb/ubuntu/linux-image-4.15.0-1072-oracle?distro=bionic < 4.15.0-1072.80
ID
USN-4979-1
Severity
medium
URL
https://ubuntu.com/security/notices/USN-4979-1
Published
2021-06-04T19:04:17
(3 years ago)
Modified
2021-06-04T19:04:17
(3 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-virtual?distro=bionic ubuntu linux-image-virtual < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=xenial ubuntu linux-image-virtual-hwe-16.04 < 4.15.0.144.140 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-hwe-16.04?distro=bionic ubuntu linux-image-virtual-hwe-16.04 < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=xenial ubuntu linux-image-virtual-hwe-16.04-edge < 4.15.0.144.140 xenial
Affected pkg:deb/ubuntu/linux-image-virtual-hwe-16.04-edge?distro=bionic ubuntu linux-image-virtual-hwe-16.04-edge < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-snapdragon?distro=bionic ubuntu linux-image-snapdragon < 4.15.0.1103.106 bionic
Affected pkg:deb/ubuntu/linux-image-raspi2?distro=bionic ubuntu linux-image-raspi2 < 4.15.0.1086.83 bionic
Affected pkg:deb/ubuntu/linux-image-oracle?distro=xenial ubuntu linux-image-oracle < 4.15.0.1072.60 xenial
Affected pkg:deb/ubuntu/linux-image-oracle-lts-18.04?distro=bionic ubuntu linux-image-oracle-lts-18.04 < 4.15.0.1072.82 bionic
Affected pkg:deb/ubuntu/linux-image-oem?distro=xenial ubuntu linux-image-oem < 4.15.0.144.140 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency?distro=bionic ubuntu linux-image-lowlatency < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=xenial ubuntu linux-image-lowlatency-hwe-16.04 < 4.15.0.144.140 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04?distro=bionic ubuntu linux-image-lowlatency-hwe-16.04 < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=xenial ubuntu linux-image-lowlatency-hwe-16.04-edge < 4.15.0.144.140 xenial
Affected pkg:deb/ubuntu/linux-image-lowlatency-hwe-16.04-edge?distro=bionic ubuntu linux-image-lowlatency-hwe-16.04-edge < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-kvm?distro=bionic ubuntu linux-image-kvm < 4.15.0.1092.88 bionic
Affected pkg:deb/ubuntu/linux-image-gke?distro=xenial ubuntu linux-image-gke < 4.15.0.1100.101 xenial
Affected pkg:deb/ubuntu/linux-image-generic?distro=bionic ubuntu linux-image-generic < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-generic-lpae?distro=bionic ubuntu linux-image-generic-lpae < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04?distro=bionic ubuntu linux-image-generic-lpae-hwe-16.04 < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-generic-lpae-hwe-16.04-edge?distro=bionic ubuntu linux-image-generic-lpae-hwe-16.04-edge < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=xenial ubuntu linux-image-generic-hwe-16.04 < 4.15.0.144.140 xenial
Affected pkg:deb/ubuntu/linux-image-generic-hwe-16.04?distro=bionic ubuntu linux-image-generic-hwe-16.04 < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=xenial ubuntu linux-image-generic-hwe-16.04-edge < 4.15.0.144.140 xenial
Affected pkg:deb/ubuntu/linux-image-generic-hwe-16.04-edge?distro=bionic ubuntu linux-image-generic-hwe-16.04-edge < 4.15.0.144.131 bionic
Affected pkg:deb/ubuntu/linux-image-gcp?distro=xenial ubuntu linux-image-gcp < 4.15.0.1100.101 xenial
Affected pkg:deb/ubuntu/linux-image-gcp-lts-18.04?distro=bionic ubuntu linux-image-gcp-lts-18.04 < 4.15.0.1100.118 bionic
Affected pkg:deb/ubuntu/linux-image-azure?distro=xenial ubuntu linux-image-azure < 4.15.0.1115.106 xenial
Affected pkg:deb/ubuntu/linux-image-azure?distro=trusty ubuntu linux-image-azure < 4.15.0.1115.88 trusty
Affected pkg:deb/ubuntu/linux-image-azure-lts-18.04?distro=bionic ubuntu linux-image-azure-lts-18.04 < 4.15.0.1115.88 bionic
Affected pkg:deb/ubuntu/linux-image-azure-edge?distro=xenial ubuntu linux-image-azure-edge < 4.15.0.1115.106 xenial
Affected pkg:deb/ubuntu/linux-image-aws-lts-18.04?distro=bionic ubuntu linux-image-aws-lts-18.04 < 4.15.0.1103.106 bionic
Affected pkg:deb/ubuntu/linux-image-aws-hwe?distro=xenial ubuntu linux-image-aws-hwe < 4.15.0.1103.94 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-144-lowlatency?distro=xenial ubuntu linux-image-4.15.0-144-lowlatency < 4.15.0-144.148~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-144-lowlatency?distro=bionic ubuntu linux-image-4.15.0-144-lowlatency < 4.15.0-144.148 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-144-generic?distro=xenial ubuntu linux-image-4.15.0-144-generic < 4.15.0-144.148~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-144-generic?distro=bionic ubuntu linux-image-4.15.0-144-generic < 4.15.0-144.148 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-144-generic-lpae?distro=bionic ubuntu linux-image-4.15.0-144-generic-lpae < 4.15.0-144.148 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1115-azure?distro=xenial ubuntu linux-image-4.15.0-1115-azure < 4.15.0-1115.128~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-1115-azure?distro=trusty ubuntu linux-image-4.15.0-1115-azure < 4.15.0-1115.128~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.15.0-1115-azure?distro=bionic ubuntu linux-image-4.15.0-1115-azure < 4.15.0-1115.128 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1103-snapdragon?distro=bionic ubuntu linux-image-4.15.0-1103-snapdragon < 4.15.0-1103.112 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1103-aws?distro=xenial ubuntu linux-image-4.15.0-1103-aws < 4.15.0-1103.110~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-1103-aws?distro=bionic ubuntu linux-image-4.15.0-1103-aws < 4.15.0-1103.110 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1100-gcp?distro=xenial ubuntu linux-image-4.15.0-1100-gcp < 4.15.0-1100.113~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-1100-gcp?distro=bionic ubuntu linux-image-4.15.0-1100-gcp < 4.15.0-1100.113 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1092-kvm?distro=bionic ubuntu linux-image-4.15.0-1092-kvm < 4.15.0-1092.94 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1086-raspi2?distro=bionic ubuntu linux-image-4.15.0-1086-raspi2 < 4.15.0-1086.91 bionic
Affected pkg:deb/ubuntu/linux-image-4.15.0-1072-oracle?distro=xenial ubuntu linux-image-4.15.0-1072-oracle < 4.15.0-1072.80~16.04.1 xenial
Affected pkg:deb/ubuntu/linux-image-4.15.0-1072-oracle?distro=bionic ubuntu linux-image-4.15.0-1072-oracle < 4.15.0-1072.80 bionic
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...