[USN-4983-1] Linux kernel (OEM) vulnerabilities
Several security issues were fixed in the Linux kernel.
Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly enforce limits for pointer operations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-33200)
Piotr Krysiuk and Benedict Schlueter discovered that the eBPF
implementation in the Linux kernel performed out of bounds speculation on
pointer arithmetic. A local attacker could use this to expose sensitive
information. (CVE-2021-29155)
Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly prevent speculative loads in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-31829)
Reiji Watanabe discovered that the KVM VMX implementation in the Linux
kernel did not properly prevent user space from tampering with an array
index value, leading to a potential out-of-bounds write. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3501)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-oem-20.04b?distro=focal | < 5.10.0.1029.30 |
pkg:deb/ubuntu/linux-image-oem-20.04?distro=focal | < 5.10.0.1029.30 |
pkg:deb/ubuntu/linux-image-oem-20.04-edge?distro=focal | < 5.10.0.1029.30 |
pkg:deb/ubuntu/linux-image-5.10.0-1029-oem?distro=focal | < 5.10.0-1029.30 |
- ID
- USN-4983-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-4983-1
- Published
-
2021-06-03T20:43:59
(3 years ago) - Modified
-
2021-06-03T20:43:59
(3 years ago) - Other Advisories
-
- ALAS-2021-1503
- ALAS-2021-1516
- ALAS2-2021-1636
- ALAS2-2021-1675
- ALSA-2021:2168
- ALSA-2021:4356
- ELSA-2021-2168
- ELSA-2021-4356
- ELSA-2021-9362
- ELSA-2021-9363
- FEDORA-2021-0b35886add
- FEDORA-2021-5ad5249c43
- FEDORA-2021-646098b5b8
- FEDORA-2021-7c085ca697
- FEDORA-2021-8cd093f639
- FEDORA-2021-9c0276e935
- FEDORA-2021-a963f04012
- FEDORA-2021-e6b4847979
- MS:CVE-2021-29155
- MS:CVE-2021-31829
- MS:CVE-2021-33200
- MS:CVE-2021-3501
- openSUSE-SU-2021:0716-1
- openSUSE-SU-2021:0843-1
- openSUSE-SU-2021:0873-1
- openSUSE-SU-2021:0947-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:2427-1
- RHSA-2021:2165
- RHSA-2021:2168
- RHSA-2021:2169
- RHSA-2021:4140
- RHSA-2021:4356
- RLSA-2021:2168
- SUSE-SU-2021:1571-1
- SUSE-SU-2021:1572-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1574-1
- SUSE-SU-2021:1595-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1605-1
- SUSE-SU-2021:1622-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1887-1
- SUSE-SU-2021:1888-1
- SUSE-SU-2021:1889-1
- SUSE-SU-2021:1890-1
- SUSE-SU-2021:1891-1
- SUSE-SU-2021:1899-1
- SUSE-SU-2021:1912-1
- SUSE-SU-2021:1913-1
- SUSE-SU-2021:1915-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2020-1
- SUSE-SU-2021:2027-1
- SUSE-SU-2021:2057-1
- SUSE-SU-2021:2208-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2422-1
- SUSE-SU-2021:2427-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:1489-1
- USN-4977-1
- USN-4997-1
- USN-4997-2
- USN-4999-1
- USN-5000-1
- USN-5000-2
- USN-5018-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-oem-20.04b?distro=focal | ubuntu | linux-image-oem-20.04b | < 5.10.0.1029.30 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oem-20.04?distro=focal | ubuntu | linux-image-oem-20.04 | < 5.10.0.1029.30 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oem-20.04-edge?distro=focal | ubuntu | linux-image-oem-20.04-edge | < 5.10.0.1029.30 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.10.0-1029-oem?distro=focal | ubuntu | linux-image-5.10.0-1029-oem | < 5.10.0-1029.30 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |