First published: Tue Mar 16 2021(Updated: )
It was discovered that the Marvell WiFi-Ex device driver in the Linux kernel did not properly validate ad-hoc SSIDs. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-36158) Loris Reiff discovered that the BPF implementation in the Linux kernel did not properly validate attributes in the getsockopt BPF hook. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2021-20194)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.8.0-1017-raspi | <5.8.0-1017.20 | 5.8.0-1017.20 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1017-raspi-nolpae | <5.8.0-1017.20 | 5.8.0-1017.20 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1020-kvm | <5.8.0-1020.22 | 5.8.0-1020.22 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1022-oracle | <5.8.0-1022.23 | 5.8.0-1022.23 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1024-azure | <5.8.0-1024.26 | 5.8.0-1024.26 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1024-gcp | <5.8.0-1024.25 | 5.8.0-1024.25 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1025-aws | <5.8.0-1025.27 | 5.8.0-1025.27 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-45-generic | <5.8.0-45.51 | 5.8.0-45.51 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-45-generic-64k | <5.8.0-45.51 | 5.8.0-45.51 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-45-generic-lpae | <5.8.0-45.51 | 5.8.0-45.51 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-45-lowlatency | <5.8.0-45.51 | 5.8.0-45.51 |
=20.10 | ||
All of | ||
ubuntu/linux-image-aws | <5.8.0.1025.27 | 5.8.0.1025.27 |
=20.10 | ||
All of | ||
ubuntu/linux-image-azure | <5.8.0.1024.24 | 5.8.0.1024.24 |
=20.10 | ||
All of | ||
ubuntu/linux-image-gcp | <5.8.0.1024.24 | 5.8.0.1024.24 |
=20.10 | ||
All of | ||
ubuntu/linux-image-generic | <5.8.0.45.50 | 5.8.0.45.50 |
=20.10 | ||
All of | ||
ubuntu/linux-image-generic-64k | <5.8.0.45.50 | 5.8.0.45.50 |
=20.10 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.8.0.45.50 | 5.8.0.45.50 |
=20.10 | ||
All of | ||
ubuntu/linux-image-gke | <5.8.0.1024.24 | 5.8.0.1024.24 |
=20.10 | ||
All of | ||
ubuntu/linux-image-kvm | <5.8.0.1020.22 | 5.8.0.1020.22 |
=20.10 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.8.0.45.50 | 5.8.0.45.50 |
=20.10 | ||
All of | ||
ubuntu/linux-image-oem-20.04 | <5.8.0.45.50 | 5.8.0.45.50 |
=20.10 | ||
All of | ||
ubuntu/linux-image-oracle | <5.8.0.1022.21 | 5.8.0.1022.21 |
=20.10 | ||
All of | ||
ubuntu/linux-image-raspi | <5.8.0.1017.20 | 5.8.0.1017.20 |
=20.10 | ||
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.8.0.1017.20 | 5.8.0.1017.20 |
=20.10 | ||
All of | ||
ubuntu/linux-image-virtual | <5.8.0.45.50 | 5.8.0.45.50 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-45-generic | <5.8.0-45.51~20.04.1 | 5.8.0-45.51~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.8.0-45-generic-64k | <5.8.0-45.51~20.04.1 | 5.8.0-45.51~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.8.0-45-generic-lpae | <5.8.0-45.51~20.04.1 | 5.8.0-45.51~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.8.0-45-lowlatency | <5.8.0-45.51~20.04.1 | 5.8.0-45.51~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-64k-hwe-20.04 | <5.8.0.45.51~20.04.31 | 5.8.0.45.51~20.04.31 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-20.04 | <5.8.0.45.51~20.04.31 | 5.8.0.45.51~20.04.31 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-hwe-20.04 | <5.8.0.45.51~20.04.31 | 5.8.0.45.51~20.04.31 |
=20.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-20.04 | <5.8.0.45.51~20.04.31 | 5.8.0.45.51~20.04.31 |
=20.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-20.04 | <5.8.0.45.51~20.04.31 | 5.8.0.45.51~20.04.31 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.