[USN-4999-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)
Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly enforce limits for pointer operations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-33200)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did
not properly clear received fragments from memory in some situations. A
physically proximate attacker could possibly use this issue to inject
packets or expose sensitive information. (CVE-2020-24586)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled encrypted fragments. A physically proximate attacker
could possibly use this issue to decrypt fragments. (CVE-2020-24587)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled certain malformed frames. If a user were tricked into
connecting to a malicious server, a physically proximate attacker could use
this issue to inject packets. (CVE-2020-24588)
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2020-25670)
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly deallocate memory in certain error
situations. A local attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly handle error conditions in some situations,
leading to an infinite loop. A local attacker could use this to cause a
denial of service. (CVE-2020-25673)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled EAPOL frames from unauthenticated senders. A physically
proximate attacker could inject malicious packets to cause a denial of
service (system crash). (CVE-2020-26139)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did
not properly verify certain fragmented frames. A physically proximate
attacker could possibly use this issue to inject or decrypt packets.
(CVE-2020-26141)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
accepted plaintext fragments in certain situations. A physically proximate
attacker could use this issue to inject packets. (CVE-2020-26145)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could
reassemble mixed encrypted and plaintext fragments. A physically proximate
attacker could possibly use this issue to inject packets or exfiltrate
selected fragments. (CVE-2020-26147)
Or Cohen discovered that the SCTP implementation in the Linux kernel
contained a race condition in some situations, leading to a use-after-free
condition. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-23133)
Piotr Krysiuk and Benedict Schlueter discovered that the eBPF
implementation in the Linux kernel performed out of bounds speculation on
pointer arithmetic. A local attacker could use this to expose sensitive
information. (CVE-2021-29155)
Manfred Paul discovered that the extended Berkeley Packet Filter (eBPF)
implementation in the Linux kernel contained an out-of-bounds
vulnerability. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-31440)
Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly prevent speculative loads in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-31829)
- ID
- USN-4999-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-4999-1
- Published
-
2021-06-23T02:52:44
(3 years ago) - Modified
-
2021-06-23T02:52:44
(3 years ago) - Other Advisories
-
- ALAS-2021-1503
- ALAS-2021-1516
- ALAS-2021-1539
- ALAS2-2021-1627
- ALAS2-2021-1636
- ALAS2-2021-1675
- ALSA-2021:3057
- ALSA-2021:4356
- ASA-202107-48
- ASA-202107-49
- ASA-202107-50
- ASA-202107-51
- CISCO-SA-WIFI-FAF-22EPCEWU
- DSA-4941-1
- ELSA-2021-3057
- ELSA-2021-4356
- ELSA-2021-9306
- ELSA-2021-9307
- ELSA-2021-9349
- ELSA-2021-9351
- ELSA-2021-9362
- ELSA-2021-9363
- ELSA-2021-9404
- ELSA-2021-9406
- ELSA-2021-9407
- ELSA-2021-9410
- ELSA-2021-9442
- ELSA-2021-9450
- ELSA-2021-9451
- ELSA-2021-9452
- ELSA-2021-9453
- ELSA-2021-9459
- FEDORA-2021-0b35886add
- FEDORA-2021-1c170a7c7c
- FEDORA-2021-21360476b6
- FEDORA-2021-5ad5249c43
- FEDORA-2021-646098b5b8
- FEDORA-2021-7c085ca697
- FEDORA-2021-8cd093f639
- FEDORA-2021-95f2f1cfc7
- FEDORA-2021-9c0276e935
- FEDORA-2021-a963f04012
- FEDORA-2021-d56567bdab
- FEDORA-2021-e6b4847979
- FEDORA-2021-fe826f202e
- FREEBSD:8D20BD48-A4F3-11EC-90DE-1C697AA5A594
- MS:CVE-2020-24587
- MS:CVE-2020-24588
- MS:CVE-2020-25672
- MS:CVE-2021-23133
- MS:CVE-2021-29155
- MS:CVE-2021-31829
- MS:CVE-2021-33200
- MS:CVE-2021-3609
- openSUSE-SU-2021:0579-1
- openSUSE-SU-2021:0716-1
- openSUSE-SU-2021:0758-1
- openSUSE-SU-2021:0843-1
- openSUSE-SU-2021:0873-1
- openSUSE-SU-2021:0947-1
- openSUSE-SU-2021:1076-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:2427-1
- openSUSE-SU-2021:2645-1
- openSUSE-SU-2021:2687-1
- RHSA-2021:3044
- RHSA-2021:3057
- RHSA-2021:3088
- RHSA-2021:4140
- RHSA-2021:4356
- RLSA-2021:3057
- SSA:2021-202-01
- SUSE-SU-2021:1210-1
- SUSE-SU-2021:1211-1
- SUSE-SU-2021:1238-1
- SUSE-SU-2021:1248-1
- SUSE-SU-2021:1266-1
- SUSE-SU-2021:1301-1
- SUSE-SU-2021:1571-1
- SUSE-SU-2021:1572-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1574-1
- SUSE-SU-2021:1595-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1605-1
- SUSE-SU-2021:1617-1
- SUSE-SU-2021:1622-1
- SUSE-SU-2021:1623-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1625-1
- SUSE-SU-2021:1887-1
- SUSE-SU-2021:1888-1
- SUSE-SU-2021:1889-1
- SUSE-SU-2021:1890-1
- SUSE-SU-2021:1891-1
- SUSE-SU-2021:1899-1
- SUSE-SU-2021:1912-1
- SUSE-SU-2021:1913-1
- SUSE-SU-2021:1915-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2020-1
- SUSE-SU-2021:2027-1
- SUSE-SU-2021:2057-1
- SUSE-SU-2021:2208-1
- SUSE-SU-2021:2321-1
- SUSE-SU-2021:2324-1
- SUSE-SU-2021:2332-1
- SUSE-SU-2021:2344-1
- SUSE-SU-2021:2349-1
- SUSE-SU-2021:2361-1
- SUSE-SU-2021:2366-1
- SUSE-SU-2021:2367-1
- SUSE-SU-2021:2377-1
- SUSE-SU-2021:2384-1
- SUSE-SU-2021:2387-1
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2407-1
- SUSE-SU-2021:2408-1
- SUSE-SU-2021:2416-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2422-1
- SUSE-SU-2021:2427-1
- SUSE-SU-2021:2438-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2021:2453-1
- SUSE-SU-2021:2460-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2021:2599-1
- SUSE-SU-2021:2599-2
- SUSE-SU-2021:2643-1
- SUSE-SU-2021:2645-1
- SUSE-SU-2021:2687-1
- SUSE-SU-2021:2746-1
- SUSE-SU-2021:2842-1
- SUSE-SU-2021:3360-1
- SUSE-SU-2022:0234-1
- SUSE-SU-2022:0243-1
- SUSE-SU-2022:0255-1
- SUSE-SU-2022:0263-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0296-1
- SUSE-SU-2022:0325-1
- SUSE-SU-2023:0394-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:1489-1
- USN-4948-1
- USN-4977-1
- USN-4979-1
- USN-4982-1
- USN-4983-1
- USN-4997-1
- USN-4997-2
- USN-5000-1
- USN-5000-2
- USN-5001-1
- USN-5002-1
- USN-5003-1
- USN-5018-1
- USN-5082-1
- USN-5299-1
- USN-5343-1
- USN-5361-1
- USN-5505-1
- USN-5513-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=groovy | ubuntu | linux-image-virtual | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-20.04?distro=groovy | ubuntu | linux-image-virtual-hwe-20.04 | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-20.04?distro=focal | ubuntu | linux-image-virtual-hwe-20.04 | < 5.8.0.59.66~20.04.42 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-virtual-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-virtual-hwe-20.04-edge | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-raspi?distro=groovy | ubuntu | linux-image-raspi | < 5.8.0.1029.31 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-raspi-nolpae?distro=groovy | ubuntu | linux-image-raspi-nolpae | < 5.8.0.1029.31 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-oracle?distro=groovy | ubuntu | linux-image-oracle | < 5.8.0.1033.32 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-oracle?distro=focal | ubuntu | linux-image-oracle | < 5.8.0.1033.34~20.04.9 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oracle-edge?distro=focal | ubuntu | linux-image-oracle-edge | < 5.8.0.1033.34~20.04.9 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oem-20.04?distro=groovy | ubuntu | linux-image-oem-20.04 | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=groovy | ubuntu | linux-image-lowlatency | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-20.04?distro=groovy | ubuntu | linux-image-lowlatency-hwe-20.04 | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-20.04?distro=focal | ubuntu | linux-image-lowlatency-hwe-20.04 | < 5.8.0.59.66~20.04.42 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-lowlatency-hwe-20.04-edge | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-kvm?distro=groovy | ubuntu | linux-image-kvm | < 5.8.0.1030.32 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-gke?distro=groovy | ubuntu | linux-image-gke | < 5.8.0.1035.35 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=groovy | ubuntu | linux-image-generic | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=groovy | ubuntu | linux-image-generic-lpae | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-20.04?distro=groovy | ubuntu | linux-image-generic-lpae-hwe-20.04 | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-20.04?distro=focal | ubuntu | linux-image-generic-lpae-hwe-20.04 | < 5.8.0.59.66~20.04.42 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-generic-lpae-hwe-20.04-edge | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-20.04?distro=groovy | ubuntu | linux-image-generic-hwe-20.04 | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-20.04?distro=focal | ubuntu | linux-image-generic-hwe-20.04 | < 5.8.0.59.66~20.04.42 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-generic-hwe-20.04-edge | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k?distro=groovy | ubuntu | linux-image-generic-64k | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k-hwe-20.04?distro=groovy | ubuntu | linux-image-generic-64k-hwe-20.04 | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k-hwe-20.04?distro=focal | ubuntu | linux-image-generic-64k-hwe-20.04 | < 5.8.0.59.66~20.04.42 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-generic-64k-hwe-20.04-edge?distro=groovy | ubuntu | linux-image-generic-64k-hwe-20.04-edge | < 5.8.0.59.64 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=groovy | ubuntu | linux-image-gcp | < 5.8.0.1035.35 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=focal | ubuntu | linux-image-gcp | < 5.8.0.1035.37~20.04.9 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-gcp-edge?distro=focal | ubuntu | linux-image-gcp-edge | < 5.8.0.1035.37~20.04.9 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-azure?distro=groovy | ubuntu | linux-image-azure | < 5.8.0.1036.36 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-azure?distro=focal | ubuntu | linux-image-azure | < 5.8.0.1036.38~20.04.8 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-azure-edge?distro=focal | ubuntu | linux-image-azure-edge | < 5.8.0.1036.38~20.04.8 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=groovy | ubuntu | linux-image-aws | < 5.8.0.1038.40 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=focal | ubuntu | linux-image-aws | < 5.8.0.1038.40~20.04.11 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-59-lowlatency?distro=groovy | ubuntu | linux-image-5.8.0-59-lowlatency | < 5.8.0-59.66 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-59-lowlatency?distro=focal | ubuntu | linux-image-5.8.0-59-lowlatency | < 5.8.0-59.66~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-59-generic?distro=groovy | ubuntu | linux-image-5.8.0-59-generic | < 5.8.0-59.66 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-59-generic?distro=focal | ubuntu | linux-image-5.8.0-59-generic | < 5.8.0-59.66~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-59-generic-lpae?distro=groovy | ubuntu | linux-image-5.8.0-59-generic-lpae | < 5.8.0-59.66 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-59-generic-lpae?distro=focal | ubuntu | linux-image-5.8.0-59-generic-lpae | < 5.8.0-59.66~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-59-generic-64k?distro=groovy | ubuntu | linux-image-5.8.0-59-generic-64k | < 5.8.0-59.66 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-59-generic-64k?distro=focal | ubuntu | linux-image-5.8.0-59-generic-64k | < 5.8.0-59.66~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1038-aws?distro=groovy | ubuntu | linux-image-5.8.0-1038-aws | < 5.8.0-1038.40 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1038-aws?distro=focal | ubuntu | linux-image-5.8.0-1038-aws | < 5.8.0-1038.40~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1036-azure?distro=groovy | ubuntu | linux-image-5.8.0-1036-azure | < 5.8.0-1036.38 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1036-azure?distro=focal | ubuntu | linux-image-5.8.0-1036-azure | < 5.8.0-1036.38~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1035-gcp?distro=groovy | ubuntu | linux-image-5.8.0-1035-gcp | < 5.8.0-1035.37 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1035-gcp?distro=focal | ubuntu | linux-image-5.8.0-1035-gcp | < 5.8.0-1035.37~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1033-oracle?distro=groovy | ubuntu | linux-image-5.8.0-1033-oracle | < 5.8.0-1033.34 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1033-oracle?distro=focal | ubuntu | linux-image-5.8.0-1033-oracle | < 5.8.0-1033.34~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1030-kvm?distro=groovy | ubuntu | linux-image-5.8.0-1030-kvm | < 5.8.0-1030.32 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1029-raspi?distro=groovy | ubuntu | linux-image-5.8.0-1029-raspi | < 5.8.0-1029.32 | groovy | ||
Affected | pkg:deb/ubuntu/linux-image-5.8.0-1029-raspi-nolpae?distro=groovy | ubuntu | linux-image-5.8.0-1029-raspi-nolpae | < 5.8.0-1029.32 | groovy |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |