[USN-5217-1] Linux kernel (OEM) vulnerabilities
Severity
High
Affected Packages
13
CVEs
2
Several security issues were fixed in the Linux kernel.
It was discovered that the NFS server implementation in the Linux kernel
contained an out-of-bounds write vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2021-4090)
It was discovered that the eBPF implementation in the Linux kernel did
not properly validate the memory size of certain ring buffer operation
arguments. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4204)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-tools-oem-20.04d?distro=focal | < 5.14.0.1018.16 |
pkg:deb/ubuntu/linux-tools-5.14.0-1018-oem?distro=focal | < 5.14.0-1018.19 |
pkg:deb/ubuntu/linux-oem-5.14-tools-host?distro=focal | < 5.14.0-1018.19 |
pkg:deb/ubuntu/linux-oem-5.14-tools-5.14.0-1018?distro=focal | < 5.14.0-1018.19 |
pkg:deb/ubuntu/linux-oem-5.14-headers-5.14.0-1018?distro=focal | < 5.14.0-1018.19 |
pkg:deb/ubuntu/linux-oem-20.04d?distro=focal | < 5.14.0.1018.16 |
pkg:deb/ubuntu/linux-modules-5.14.0-1018-oem?distro=focal | < 5.14.0-1018.19 |
pkg:deb/ubuntu/linux-image-unsigned-5.14.0-1018-oem?distro=focal | < 5.14.0-1018.19 |
pkg:deb/ubuntu/linux-image-oem-20.04d?distro=focal | < 5.14.0.1018.16 |
pkg:deb/ubuntu/linux-image-5.14.0-1018-oem?distro=focal | < 5.14.0-1018.19 |
pkg:deb/ubuntu/linux-headers-oem-20.04d?distro=focal | < 5.14.0.1018.16 |
pkg:deb/ubuntu/linux-headers-5.14.0-1018-oem?distro=focal | < 5.14.0-1018.19 |
pkg:deb/ubuntu/linux-buildinfo-5.14.0-1018-oem?distro=focal | < 5.14.0-1018.19 |
- ID
- USN-5217-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-5217-1
- Published
-
2022-01-11T04:56:24
(2 years ago) - Modified
-
2022-01-11T04:56:24
(2 years ago) - Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-oem-20.04d?distro=focal | ubuntu | linux-tools-oem-20.04d | < 5.14.0.1018.16 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-5.14.0-1018-oem?distro=focal | ubuntu | linux-tools-5.14.0-1018-oem | < 5.14.0-1018.19 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-5.14-tools-host?distro=focal | ubuntu | linux-oem-5.14-tools-host | < 5.14.0-1018.19 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-5.14-tools-5.14.0-1018?distro=focal | ubuntu | linux-oem-5.14-tools-5.14.0-1018 | < 5.14.0-1018.19 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-5.14-headers-5.14.0-1018?distro=focal | ubuntu | linux-oem-5.14-headers-5.14.0-1018 | < 5.14.0-1018.19 | focal | ||
Affected | pkg:deb/ubuntu/linux-oem-20.04d?distro=focal | ubuntu | linux-oem-20.04d | < 5.14.0.1018.16 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-5.14.0-1018-oem?distro=focal | ubuntu | linux-modules-5.14.0-1018-oem | < 5.14.0-1018.19 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.14.0-1018-oem?distro=focal | ubuntu | linux-image-unsigned-5.14.0-1018-oem | < 5.14.0-1018.19 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-oem-20.04d?distro=focal | ubuntu | linux-image-oem-20.04d | < 5.14.0.1018.16 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.14.0-1018-oem?distro=focal | ubuntu | linux-image-5.14.0-1018-oem | < 5.14.0-1018.19 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-oem-20.04d?distro=focal | ubuntu | linux-headers-oem-20.04d | < 5.14.0.1018.16 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-5.14.0-1018-oem?distro=focal | ubuntu | linux-headers-5.14.0-1018-oem | < 5.14.0-1018.19 | focal | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.14.0-1018-oem?distro=focal | ubuntu | linux-buildinfo-5.14.0-1018-oem | < 5.14.0-1018.19 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |