[USN-5082-1] Linux kernel (OEM) vulnerabilities

Severity High
Affected Packages 13
CVEs 3

Several security issues were fixed in the Linux kernel.

Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor
implementation for AMD processors in the Linux kernel allowed a guest VM to
disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a
guest VM could use this to read or write portions of the host's physical
memory. (CVE-2021-3656)

Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host's physical memory. (CVE-2021-3653)

Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)

ID
USN-5082-1
Severity
high
URL
https://ubuntu.com/security/notices/USN-5082-1
Published
2021-09-16T16:49:22
(3 years ago)
Modified
2021-09-16T16:49:22
(3 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-oem-20.04c?distro=focal ubuntu linux-tools-oem-20.04c < 5.13.0.1012.16 focal
Affected pkg:deb/ubuntu/linux-tools-5.13.0-1012-oem?distro=focal ubuntu linux-tools-5.13.0-1012-oem < 5.13.0-1012.16 focal
Affected pkg:deb/ubuntu/linux-oem-5.13-tools-host?distro=focal ubuntu linux-oem-5.13-tools-host < 5.13.0-1012.16 focal
Affected pkg:deb/ubuntu/linux-oem-5.13-tools-5.13.0-1012?distro=focal ubuntu linux-oem-5.13-tools-5.13.0-1012 < 5.13.0-1012.16 focal
Affected pkg:deb/ubuntu/linux-oem-5.13-headers-5.13.0-1012?distro=focal ubuntu linux-oem-5.13-headers-5.13.0-1012 < 5.13.0-1012.16 focal
Affected pkg:deb/ubuntu/linux-oem-20.04c?distro=focal ubuntu linux-oem-20.04c < 5.13.0.1012.16 focal
Affected pkg:deb/ubuntu/linux-modules-5.13.0-1012-oem?distro=focal ubuntu linux-modules-5.13.0-1012-oem < 5.13.0-1012.16 focal
Affected pkg:deb/ubuntu/linux-image-unsigned-5.13.0-1012-oem?distro=focal ubuntu linux-image-unsigned-5.13.0-1012-oem < 5.13.0-1012.16 focal
Affected pkg:deb/ubuntu/linux-image-oem-20.04c?distro=focal ubuntu linux-image-oem-20.04c < 5.13.0.1012.16 focal
Affected pkg:deb/ubuntu/linux-image-5.13.0-1012-oem?distro=focal ubuntu linux-image-5.13.0-1012-oem < 5.13.0-1012.16 focal
Affected pkg:deb/ubuntu/linux-headers-oem-20.04c?distro=focal ubuntu linux-headers-oem-20.04c < 5.13.0.1012.16 focal
Affected pkg:deb/ubuntu/linux-headers-5.13.0-1012-oem?distro=focal ubuntu linux-headers-5.13.0-1012-oem < 5.13.0-1012.16 focal
Affected pkg:deb/ubuntu/linux-buildinfo-5.13.0-1012-oem?distro=focal ubuntu linux-buildinfo-5.13.0-1012-oem < 5.13.0-1012.16 focal
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...