[USN-4997-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)
Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly enforce limits for pointer operations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-33200)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did
not properly clear received fragments from memory in some situations. A
physically proximate attacker could possibly use this issue to inject
packets or expose sensitive information. (CVE-2020-24586)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled encrypted fragments. A physically proximate attacker
could possibly use this issue to decrypt fragments. (CVE-2020-24587)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled certain malformed frames. If a user were tricked into
connecting to a malicious server, a physically proximate attacker could use
this issue to inject packets. (CVE-2020-24588)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled EAPOL frames from unauthenticated senders. A physically
proximate attacker could inject malicious packets to cause a denial of
service (system crash). (CVE-2020-26139)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did
not properly verify certain fragmented frames. A physically proximate
attacker could possibly use this issue to inject or decrypt packets.
(CVE-2020-26141)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
accepted plaintext fragments in certain situations. A physically proximate
attacker could use this issue to inject packets. (CVE-2020-26145)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could
reassemble mixed encrypted and plaintext fragments. A physically proximate
attacker could possibly use this issue to inject packets or exfiltrate
selected fragments. (CVE-2020-26147)
Or Cohen discovered that the SCTP implementation in the Linux kernel
contained a race condition in some situations, leading to a use-after-free
condition. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-23133)
Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the
nfc implementation in the Linux kernel. A privileged local attacker could
use this issue to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-23134)
Manfred Paul discovered that the extended Berkeley Packet Filter (eBPF)
implementation in the Linux kernel contained an out-of-bounds
vulnerability. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-31440)
Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly prevent speculative loads in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-31829)
It was discovered that a race condition in the kernel Bluetooth subsystem
could lead to use-after-free of slab objects. An attacker could use this
issue to possibly execute arbitrary code. (CVE-2021-32399)
It was discovered that a use-after-free existed in the Bluetooth HCI driver
of the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)
It was discovered that an out-of-bounds (OOB) memory access flaw existed in
the f2fs module of the Linux kernel. A local attacker could use this issue
to cause a denial of service (system crash). (CVE-2021-3506)
Mathias Krause discovered that a null pointer dereference existed in the
Nitro Enclaves kernel driver of the Linux kernel. A local attacker could
use this issue to cause a denial of service or possibly execute arbitrary
code. (CVE-2021-3543)
- ID
- USN-4997-1
- Severity
- high
- Severity from
- CVE-2021-23134
- URL
- https://ubuntu.com/security/notices/USN-4997-1
- Published
-
2021-06-23T01:18:14
(3 years ago) - Modified
-
2021-06-23T01:18:14
(3 years ago) - Other Advisories
-
- ALAS-2021-1503
- ALAS-2021-1516
- ALAS-2021-1539
- ALAS2-2021-1636
- ALAS2-2021-1675
- ALAS2-2021-1685
- ALSA-2021:2168
- ALSA-2021:2570
- ALSA-2021:2714
- ALSA-2021:3057
- ALSA-2021:4356
- ASA-202107-48
- ASA-202107-49
- ASA-202107-50
- ASA-202107-51
- CISCO-SA-WIFI-FAF-22EPCEWU
- DSA-4941-1
- ELSA-2021-2168
- ELSA-2021-2570
- ELSA-2021-2714
- ELSA-2021-2725
- ELSA-2021-3057
- ELSA-2021-3327
- ELSA-2021-4356
- ELSA-2021-9306
- ELSA-2021-9307
- ELSA-2021-9346
- ELSA-2021-9349
- ELSA-2021-9351
- ELSA-2021-9362
- ELSA-2021-9363
- ELSA-2021-9395
- ELSA-2021-9404
- ELSA-2021-9406
- ELSA-2021-9442
- ELSA-2021-9450
- ELSA-2021-9451
- ELSA-2021-9452
- ELSA-2021-9453
- ELSA-2021-9459
- ELSA-2022-9793
- FEDORA-2021-05152dbcf5
- FEDORA-2021-0b35886add
- FEDORA-2021-286375de1e
- FEDORA-2021-5ad5249c43
- FEDORA-2021-646098b5b8
- FEDORA-2021-7c085ca697
- FEDORA-2021-8cd093f639
- FEDORA-2021-95f2f1cfc7
- FEDORA-2021-9c0276e935
- FEDORA-2021-a963f04012
- FEDORA-2021-bae582b42c
- FEDORA-2021-e6b4847979
- FEDORA-2021-fe826f202e
- FREEBSD:8D20BD48-A4F3-11EC-90DE-1C697AA5A594
- MS:CVE-2020-24587
- MS:CVE-2020-24588
- MS:CVE-2021-23133
- MS:CVE-2021-23134
- MS:CVE-2021-31829
- MS:CVE-2021-32399
- MS:CVE-2021-33034
- MS:CVE-2021-33200
- MS:CVE-2021-3506
- MS:CVE-2021-3609
- openSUSE-SU-2021:0843-1
- openSUSE-SU-2021:0947-1
- openSUSE-SU-2021:1076-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:2427-1
- openSUSE-SU-2021:2645-1
- openSUSE-SU-2021:2687-1
- RHSA-2021:2168
- RHSA-2021:2169
- RHSA-2021:2563
- RHSA-2021:2570
- RHSA-2021:2599
- RHSA-2021:2714
- RHSA-2021:2715
- RHSA-2021:2716
- RHSA-2021:2725
- RHSA-2021:2726
- RHSA-2021:2727
- RHSA-2021:3044
- RHSA-2021:3057
- RHSA-2021:3088
- RHSA-2021:3327
- RHSA-2021:3328
- RHSA-2021:3381
- RHSA-2021:4140
- RHSA-2021:4356
- RLSA-2021:2168
- RLSA-2021:2570
- RLSA-2021:2714
- RLSA-2021:3057
- SSA:2021-202-01
- SUSE-SU-2021:1887-1
- SUSE-SU-2021:1888-1
- SUSE-SU-2021:1889-1
- SUSE-SU-2021:1890-1
- SUSE-SU-2021:1891-1
- SUSE-SU-2021:1899-1
- SUSE-SU-2021:1912-1
- SUSE-SU-2021:1913-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2020-1
- SUSE-SU-2021:2025-1
- SUSE-SU-2021:2026-1
- SUSE-SU-2021:2027-1
- SUSE-SU-2021:2042-1
- SUSE-SU-2021:2057-1
- SUSE-SU-2021:2060-1
- SUSE-SU-2021:2067-1
- SUSE-SU-2021:2198-1
- SUSE-SU-2021:2208-1
- SUSE-SU-2021:2321-1
- SUSE-SU-2021:2324-1
- SUSE-SU-2021:2332-1
- SUSE-SU-2021:2344-1
- SUSE-SU-2021:2349-1
- SUSE-SU-2021:2361-1
- SUSE-SU-2021:2366-1
- SUSE-SU-2021:2367-1
- SUSE-SU-2021:2377-1
- SUSE-SU-2021:2384-1
- SUSE-SU-2021:2387-1
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2407-1
- SUSE-SU-2021:2408-1
- SUSE-SU-2021:2416-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2422-1
- SUSE-SU-2021:2427-1
- SUSE-SU-2021:2438-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2021:2453-1
- SUSE-SU-2021:2460-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2021:2599-1
- SUSE-SU-2021:2599-2
- SUSE-SU-2021:2643-1
- SUSE-SU-2021:2645-1
- SUSE-SU-2021:2687-1
- SUSE-SU-2021:2746-1
- SUSE-SU-2021:2842-1
- SUSE-SU-2021:3360-1
- SUSE-SU-2022:0234-1
- SUSE-SU-2022:0243-1
- SUSE-SU-2022:0255-1
- SUSE-SU-2022:0263-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0296-1
- SUSE-SU-2022:0325-1
- SUSE-SU-2022:0327-1
- SUSE-SU-2023:0394-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1870-1
- USN-4983-1
- USN-4997-2
- USN-4999-1
- USN-5000-1
- USN-5000-2
- USN-5001-1
- USN-5002-1
- USN-5003-1
- USN-5016-1
- USN-5018-1
- USN-5082-1
- USN-5299-1
- USN-5339-1
- USN-5343-1
- USN-5361-1
- USN-5505-1
- USN-5513-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=hirsute | ubuntu | linux-image-virtual | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-20.04?distro=hirsute | ubuntu | linux-image-virtual-hwe-20.04 | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-20.04-edge?distro=hirsute | ubuntu | linux-image-virtual-hwe-20.04-edge | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-raspi?distro=hirsute | ubuntu | linux-image-raspi | < 5.11.0.1012.10 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-raspi-nolpae?distro=hirsute | ubuntu | linux-image-raspi-nolpae | < 5.11.0.1012.10 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-oracle?distro=hirsute | ubuntu | linux-image-oracle | < 5.11.0.1010.10 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-oem-20.04?distro=hirsute | ubuntu | linux-image-oem-20.04 | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=hirsute | ubuntu | linux-image-lowlatency | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-20.04?distro=hirsute | ubuntu | linux-image-lowlatency-hwe-20.04 | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-20.04-edge?distro=hirsute | ubuntu | linux-image-lowlatency-hwe-20.04-edge | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-gke?distro=hirsute | ubuntu | linux-image-gke | < 5.11.0.1011.11 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=hirsute | ubuntu | linux-image-generic | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=hirsute | ubuntu | linux-image-generic-lpae | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-20.04?distro=hirsute | ubuntu | linux-image-generic-lpae-hwe-20.04 | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-20.04-edge?distro=hirsute | ubuntu | linux-image-generic-lpae-hwe-20.04-edge | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-20.04?distro=hirsute | ubuntu | linux-image-generic-hwe-20.04 | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-20.04-edge?distro=hirsute | ubuntu | linux-image-generic-hwe-20.04-edge | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k?distro=hirsute | ubuntu | linux-image-generic-64k | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k-hwe-20.04?distro=hirsute | ubuntu | linux-image-generic-64k-hwe-20.04 | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k-hwe-20.04-edge?distro=hirsute | ubuntu | linux-image-generic-64k-hwe-20.04-edge | < 5.11.0.22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=hirsute | ubuntu | linux-image-gcp | < 5.11.0.1011.11 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-azure?distro=hirsute | ubuntu | linux-image-azure | < 5.11.0.1009.9 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=hirsute | ubuntu | linux-image-aws | < 5.11.0.1011.11 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-22-lowlatency?distro=hirsute | ubuntu | linux-image-5.11.0-22-lowlatency | < 5.11.0-22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-22-generic?distro=hirsute | ubuntu | linux-image-5.11.0-22-generic | < 5.11.0-22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-22-generic-lpae?distro=hirsute | ubuntu | linux-image-5.11.0-22-generic-lpae | < 5.11.0-22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-22-generic-64k?distro=hirsute | ubuntu | linux-image-5.11.0-22-generic-64k | < 5.11.0-22.23 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-1012-raspi?distro=hirsute | ubuntu | linux-image-5.11.0-1012-raspi | < 5.11.0-1012.13 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-1012-raspi-nolpae?distro=hirsute | ubuntu | linux-image-5.11.0-1012-raspi-nolpae | < 5.11.0-1012.13 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-1011-gcp?distro=hirsute | ubuntu | linux-image-5.11.0-1011-gcp | < 5.11.0-1011.12 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-1011-aws?distro=hirsute | ubuntu | linux-image-5.11.0-1011-aws | < 5.11.0-1011.11 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-1010-oracle?distro=hirsute | ubuntu | linux-image-5.11.0-1010-oracle | < 5.11.0-1010.10 | hirsute | ||
Affected | pkg:deb/ubuntu/linux-image-5.11.0-1009-azure?distro=hirsute | ubuntu | linux-image-5.11.0-1009-azure | < 5.11.0-1009.9 | hirsute |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |