[USN-4983-1] Linux kernel (OEM) vulnerabilities

Severity High
Affected Packages 4
CVEs 4

Several security issues were fixed in the Linux kernel.

Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly enforce limits for pointer operations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-33200)

Piotr Krysiuk and Benedict Schlueter discovered that the eBPF
implementation in the Linux kernel performed out of bounds speculation on
pointer arithmetic. A local attacker could use this to expose sensitive
information. (CVE-2021-29155)

Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly prevent speculative loads in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-31829)

Reiji Watanabe discovered that the KVM VMX implementation in the Linux
kernel did not properly prevent user space from tampering with an array
index value, leading to a potential out-of-bounds write. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3501)

ID
USN-4983-1
Severity
high
URL
https://ubuntu.com/security/notices/USN-4983-1
Published
2021-06-03T20:43:59
(3 years ago)
Modified
2021-06-03T20:43:59
(3 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-oem-20.04b?distro=focal ubuntu linux-image-oem-20.04b < 5.10.0.1029.30 focal
Affected pkg:deb/ubuntu/linux-image-oem-20.04?distro=focal ubuntu linux-image-oem-20.04 < 5.10.0.1029.30 focal
Affected pkg:deb/ubuntu/linux-image-oem-20.04-edge?distro=focal ubuntu linux-image-oem-20.04-edge < 5.10.0.1029.30 focal
Affected pkg:deb/ubuntu/linux-image-5.10.0-1029-oem?distro=focal ubuntu linux-image-5.10.0-1029-oem < 5.10.0-1029.30 focal
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...