[USN-5218-1] Linux kernel (OEM) vulnerabilities

Severity High
Affected Packages 13
CVEs 8

Several security issues were fixed in the Linux kernel.

Nadav Amit discovered that the hugetlb implementation in the Linux kernel
did not perform TLB flushes under certain conditions. A local attacker
could use this to leak or alter data from other processes that use huge
pages. (CVE-2021-4002)

It was discovered that the eBPF implementation in the Linux kernel did
not properly validate the memory size of certain ring buffer operation
arguments. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4204)

It was discovered that a race condition existed in the overlay file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2021-20321)

It was discovered that the NFC subsystem in the Linux kernel contained a
use-after-free vulnerability in its NFC Controller Interface (NCI)
implementation. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2021-3760)

It was discovered that an integer overflow could be triggered in the eBPF
implementation in the Linux kernel when preallocating objects for stack
maps. A privileged local attacker could use this to cause a denial of
service or possibly execute arbitrary code. (CVE-2021-41864)

It was discovered that the KVM implementation for POWER8 processors in the
Linux kernel did not properly keep track if a wakeup event could be
resolved by a guest. An attacker in a guest VM could possibly use this to
cause a denial of service (host OS crash). (CVE-2021-43056)

It was discovered that the TIPC Protocol implementation in the Linux kernel
did not properly validate MSG_CRYPTO messages in some situations. An
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-43267)

It was discovered that the ISDN CAPI implementation in the Linux kernel
contained a race condition in certain situations that could trigger an
array out-of-bounds bug. A privileged local attacker could possibly use
this to cause a denial of service or execute arbitrary code.
(CVE-2021-43389)

ID
USN-5218-1
Severity
high
URL
https://ubuntu.com/security/notices/USN-5218-1
Published
2022-01-11T04:58:00
(2 years ago)
Modified
2022-01-11T04:58:00
(2 years ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-oem-20.04c?distro=focal ubuntu linux-tools-oem-20.04c < 5.13.0.1026.29 focal
Affected pkg:deb/ubuntu/linux-tools-5.13.0-1026-oem?distro=focal ubuntu linux-tools-5.13.0-1026-oem < 5.13.0-1026.32 focal
Affected pkg:deb/ubuntu/linux-oem-5.13-tools-host?distro=focal ubuntu linux-oem-5.13-tools-host < 5.13.0-1026.32 focal
Affected pkg:deb/ubuntu/linux-oem-5.13-tools-5.13.0-1026?distro=focal ubuntu linux-oem-5.13-tools-5.13.0-1026 < 5.13.0-1026.32 focal
Affected pkg:deb/ubuntu/linux-oem-5.13-headers-5.13.0-1026?distro=focal ubuntu linux-oem-5.13-headers-5.13.0-1026 < 5.13.0-1026.32 focal
Affected pkg:deb/ubuntu/linux-oem-20.04c?distro=focal ubuntu linux-oem-20.04c < 5.13.0.1026.29 focal
Affected pkg:deb/ubuntu/linux-modules-5.13.0-1026-oem?distro=focal ubuntu linux-modules-5.13.0-1026-oem < 5.13.0-1026.32 focal
Affected pkg:deb/ubuntu/linux-image-unsigned-5.13.0-1026-oem?distro=focal ubuntu linux-image-unsigned-5.13.0-1026-oem < 5.13.0-1026.32 focal
Affected pkg:deb/ubuntu/linux-image-oem-20.04c?distro=focal ubuntu linux-image-oem-20.04c < 5.13.0.1026.29 focal
Affected pkg:deb/ubuntu/linux-image-5.13.0-1026-oem?distro=focal ubuntu linux-image-5.13.0-1026-oem < 5.13.0-1026.32 focal
Affected pkg:deb/ubuntu/linux-headers-oem-20.04c?distro=focal ubuntu linux-headers-oem-20.04c < 5.13.0.1026.29 focal
Affected pkg:deb/ubuntu/linux-headers-5.13.0-1026-oem?distro=focal ubuntu linux-headers-5.13.0-1026-oem < 5.13.0-1026.32 focal
Affected pkg:deb/ubuntu/linux-buildinfo-5.13.0-1026-oem?distro=focal ubuntu linux-buildinfo-5.13.0-1026-oem < 5.13.0-1026.32 focal
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...