[USN-5115-1] Linux kernel (OEM) vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that a race condition existed in the Atheros Ath9k WiFi
driver in the Linux kernel. An attacker could possibly use this to expose
sensitive information (WiFi network traffic). (CVE-2020-3702)
Ofek Kirzner, Adam Morrison, Benedict Schlueter, and Piotr Krysiuk
discovered that the BPF verifier in the Linux kernel missed possible
mispredicted branches due to type confusion, allowing a side-channel
attack. An attacker could use this to expose sensitive information.
(CVE-2021-33624)
Benedict Schlueter discovered that the BPF subsystem in the Linux kernel
did not properly protect against Speculative Store Bypass (SSB) side-
channel attacks in some situations. A local attacker could possibly use
this to expose sensitive information. (CVE-2021-34556)
Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not
properly protect against Speculative Store Bypass (SSB) side-channel
attacks in some situations. A local attacker could possibly use this to
expose sensitive information. (CVE-2021-35477)
It was discovered that the tracing subsystem in the Linux kernel did not
properly keep track of per-cpu ring buffer state. A privileged attacker
could use this to cause a denial of service. (CVE-2021-3679)
It was discovered that the Option USB High Speed Mobile device driver in
the Linux kernel did not properly handle error conditions. A physically
proximate attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2021-37159)
Alois Wohlschlager discovered that the overlay file system in the Linux
kernel did not restrict private clones in some situations. An attacker
could use this to expose sensitive information. (CVE-2021-3732)
It was discovered that the btrfs file system in the Linux kernel did not
properly handle removing a non-existent device id. An attacker with
CAP_SYS_ADMIN could use this to cause a denial of service. (CVE-2021-3739)
It was discovered that the Qualcomm IPC Router protocol implementation in
the Linux kernel did not properly validate metadata in some situations. A
local attacker could use this to cause a denial of service (system crash)
or expose sensitive information. (CVE-2021-3743)
It was discovered that the virtual terminal (vt) device implementation in
the Linux kernel contained a race condition in its ioctl handling that led
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information. (CVE-2021-3753)
It was discovered that the Linux kernel did not properly account for the
memory usage of certain IPC objects. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2021-3759)
It was discovered that the BPF subsystem in the Linux kernel contained an
integer overflow in its hash table implementation. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2021-38166)
It was discovered that the MAX-3421 host USB device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2021-38204)
It was discovered that the Xilinx 10/100 Ethernet Lite device driver in the
Linux kernel could report pointer addresses in some situations. An attacker
could use this information to ease the exploitation of another
vulnerability. (CVE-2021-38205)
It was discovered that the ext4 file system in the Linux kernel contained a
race condition when writing xattrs to an inode. A local attacker could use
this to cause a denial of service or possibly gain administrative
privileges. (CVE-2021-40490)
It was discovered that the 6pack network protocol driver in the Linux
kernel did not properly perform validation checks. A privileged attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2021-42008)
- ID
- USN-5115-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-5115-1
- Published
-
2021-10-20T18:39:34
(2 years ago) - Modified
-
2021-10-20T18:39:34
(2 years ago) - Other Advisories
-
- ALAS-2021-1539
- ALAS2-2021-1685
- ALAS2-2021-1696
- ALAS2-2021-1704
- ALAS2-2021-1712
- ALAS2-2021-1719
- ALSA-2021:4356
- ALSA-2022:1988
- ALSA-2024:3138
- ASB-A-196448784
- DSA-4978-1
- ELSA-2021-4356
- ELSA-2021-9457
- ELSA-2021-9458
- ELSA-2021-9459
- ELSA-2021-9460
- ELSA-2021-9461
- ELSA-2021-9474
- ELSA-2021-9475
- ELSA-2021-9485
- ELSA-2021-9488
- ELSA-2021-9577
- ELSA-2022-1988
- ELSA-2022-9088
- ELSA-2024-3138
- FEDORA-2021-4ca1b080bb
- FEDORA-2021-4d4d3866ca
- FEDORA-2021-54ee631709
- FEDORA-2021-60f1d2eba1
- FEDORA-2021-b22606e88b
- FEDORA-2021-f35f45a76f
- MS:CVE-2021-33624
- MS:CVE-2021-37159
- MS:CVE-2021-3732
- MS:CVE-2021-3739
- MS:CVE-2021-3743
- MS:CVE-2021-40490
- MS:CVE-2021-42008
- openSUSE-SU-2021:1142-1
- openSUSE-SU-2021:1271-1
- openSUSE-SU-2021:1357-1
- openSUSE-SU-2021:1365-1
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:1501-1
- openSUSE-SU-2021:2305-1
- openSUSE-SU-2021:2352-1
- openSUSE-SU-2021:2427-1
- openSUSE-SU-2021:3179-1
- openSUSE-SU-2021:3205-1
- openSUSE-SU-2021:3338-1
- openSUSE-SU-2021:3387-1
- openSUSE-SU-2021:3447-1
- openSUSE-SU-2021:3641-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3806-1
- openSUSE-SU-2021:3876-1
- RHSA-2021:4140
- RHSA-2021:4356
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2022:1988
- RLSA-2024:3138
- SSA:2022-031-01
- SUSE-SU-2021:2303-1
- SUSE-SU-2021:2305-1
- SUSE-SU-2021:2321-1
- SUSE-SU-2021:2324-1
- SUSE-SU-2021:2325-1
- SUSE-SU-2021:2349-1
- SUSE-SU-2021:2352-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2422-1
- SUSE-SU-2021:2426-1
- SUSE-SU-2021:2427-1
- SUSE-SU-2021:3177-1
- SUSE-SU-2021:3178-1
- SUSE-SU-2021:3179-1
- SUSE-SU-2021:3192-1
- SUSE-SU-2021:3205-1
- SUSE-SU-2021:3205-2
- SUSE-SU-2021:3206-1
- SUSE-SU-2021:3207-1
- SUSE-SU-2021:3217-1
- SUSE-SU-2021:3337-1
- SUSE-SU-2021:3338-1
- SUSE-SU-2021:3339-1
- SUSE-SU-2021:3386-1
- SUSE-SU-2021:3387-1
- SUSE-SU-2021:3388-1
- SUSE-SU-2021:3389-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3447-1
- SUSE-SU-2021:3640-1
- SUSE-SU-2021:3641-1
- SUSE-SU-2021:3642-1
- SUSE-SU-2021:3658-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3748-1
- SUSE-SU-2021:3754-1
- SUSE-SU-2021:3806-1
- SUSE-SU-2021:3807-1
- SUSE-SU-2021:3848-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3933-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2021:3978-1
- SUSE-SU-2022:0234-1
- SUSE-SU-2022:0237-1
- SUSE-SU-2022:0241-1
- SUSE-SU-2022:0243-1
- SUSE-SU-2022:0246-1
- SUSE-SU-2022:0254-1
- SUSE-SU-2022:0255-1
- SUSE-SU-2022:0257-1
- SUSE-SU-2022:0263-1
- SUSE-SU-2022:0267-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0292-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0295-1
- SUSE-SU-2022:0296-1
- SUSE-SU-2022:0298-1
- SUSE-SU-2022:0325-1
- SUSE-SU-2022:0327-1
- SUSE-SU-2022:0328-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2185-1
- USN-5091-1
- USN-5091-2
- USN-5092-1
- USN-5092-2
- USN-5094-1
- USN-5094-2
- USN-5096-1
- USN-5113-1
- USN-5114-1
- USN-5116-1
- USN-5116-2
- USN-5117-1
- USN-5120-1
- USN-5135-1
- USN-5136-1
- USN-5137-1
- USN-5137-2
- USN-5163-1
- USN-5164-1
- USN-5299-1
- USN-5343-1
- USN-5361-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
- USN-6221-1
- USN-6971-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-oem-20.04b?distro=focal | ubuntu | linux-tools-oem-20.04b | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-oem-20.04?distro=focal | ubuntu | linux-tools-oem-20.04 | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-oem-20.04-edge?distro=focal | ubuntu | linux-tools-oem-20.04-edge | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-5.10.0-1050-oem?distro=focal | ubuntu | linux-tools-5.10.0-1050-oem | < 5.10.0-1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-5.10-tools-host?distro=focal | ubuntu | linux-oem-5.10-tools-host | < 5.10.0-1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-5.10-tools-5.10.0-1050?distro=focal | ubuntu | linux-oem-5.10-tools-5.10.0-1050 | < 5.10.0-1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-5.10-headers-5.10.0-1050?distro=focal | ubuntu | linux-oem-5.10-headers-5.10.0-1050 | < 5.10.0-1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-20.04b?distro=focal | ubuntu | linux-oem-20.04b | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-20.04?distro=focal | ubuntu | linux-oem-20.04 | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-20.04-edge?distro=focal | ubuntu | linux-oem-20.04-edge | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-5.10.0-1050-oem?distro=focal | ubuntu | linux-modules-5.10.0-1050-oem | < 5.10.0-1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.10.0-1050-oem?distro=focal | ubuntu | linux-image-unsigned-5.10.0-1050-oem | < 5.10.0-1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oem-20.04b?distro=focal | ubuntu | linux-image-oem-20.04b | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oem-20.04?distro=focal | ubuntu | linux-image-oem-20.04 | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oem-20.04-edge?distro=focal | ubuntu | linux-image-oem-20.04-edge | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.10.0-1050-oem?distro=focal | ubuntu | linux-image-5.10.0-1050-oem | < 5.10.0-1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-oem-20.04b?distro=focal | ubuntu | linux-headers-oem-20.04b | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-oem-20.04?distro=focal | ubuntu | linux-headers-oem-20.04 | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-oem-20.04-edge?distro=focal | ubuntu | linux-headers-oem-20.04-edge | < 5.10.0.1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-5.10.0-1050-oem?distro=focal | ubuntu | linux-headers-5.10.0-1050-oem | < 5.10.0-1050.52 | focal | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.10.0-1050-oem?distro=focal | ubuntu | linux-buildinfo-5.10.0-1050-oem | < 5.10.0-1050.52 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |