First published: Tue May 11 2021(Updated: )
Ryota Shiga discovered that the eBPF implementation in the Linux kernel did not properly verify that a BPF program only reserved as much memory for a ring buffer as was allocated. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-3489) Manfred Paul discovered that the eBPF implementation in the Linux kernel did not properly track bounds on bitwise operations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-3490) Billy Jheng Bing-Jhong discovered that the io_uring implementation of the Linux kernel did not properly enforce the MAX_RW_COUNT limit in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-3491) It was discovered that the Nouveau GPU driver in the Linux kernel did not properly handle error conditions in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-25639) Olivier Benjamin, Norbert Manthey, Martin Mazein, and Jan H. Schönherr discovered that the Xen paravirtualization backend in the Linux kernel did not properly propagate errors to frontend drivers in some situations. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash). (CVE-2021-26930) Jan Beulich discovered that multiple Xen backends in the Linux kernel did not properly handle certain error conditions under paravirtualization. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash). (CVE-2021-26931) It was discovered that the fastrpc driver in the Linux kernel did not prevent user space applications from sending kernel RPC messages. A local attacker could possibly use this to gain elevated privileges. (CVE-2021-28375) It was discovered that the Freescale Gianfar Ethernet driver for the Linux kernel did not properly handle receive queue overrun when jumbo frames were enabled in some situations. An attacker could use this to cause a denial of service (system crash). (CVE-2021-29264) It was discovered that the USB/IP driver in the Linux kernel contained race conditions during the update of local and shared status. An attacker could use this to cause a denial of service (system crash). (CVE-2021-29265) It was discovered that the vDPA backend virtio driver in the Linux kernel contained a use-after-free vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-29266) It was discovered that the TIPC protocol implementation in the Linux kernel did not properly validate passed encryption key sizes. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-29646) It was discovered that a race condition existed in the netfilter subsystem of the Linux kernel when replacing tables. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-29650)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.8.0-1024-raspi | <5.8.0-1024.27 | 5.8.0-1024.27 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1024-raspi-nolpae | <5.8.0-1024.27 | 5.8.0-1024.27 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1027-kvm | <5.8.0-1027.29 | 5.8.0-1027.29 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1029-oracle | <5.8.0-1029.30 | 5.8.0-1029.30 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1031-gcp | <5.8.0-1031.32 | 5.8.0-1031.32 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1032-azure | <5.8.0-1032.34 | 5.8.0-1032.34 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-1033-aws | <5.8.0-1033.35 | 5.8.0-1033.35 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-53-generic | <5.8.0-53.60 | 5.8.0-53.60 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-53-generic-64k | <5.8.0-53.60 | 5.8.0-53.60 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-53-generic-lpae | <5.8.0-53.60 | 5.8.0-53.60 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-53-lowlatency | <5.8.0-53.60 | 5.8.0-53.60 |
=20.10 | ||
All of | ||
ubuntu/linux-image-aws | <5.8.0.1033.35 | 5.8.0.1033.35 |
=20.10 | ||
All of | ||
ubuntu/linux-image-azure | <5.8.0.1032.32 | 5.8.0.1032.32 |
=20.10 | ||
All of | ||
ubuntu/linux-image-gcp | <5.8.0.1031.31 | 5.8.0.1031.31 |
=20.10 | ||
All of | ||
ubuntu/linux-image-generic | <5.8.0.53.58 | 5.8.0.53.58 |
=20.10 | ||
All of | ||
ubuntu/linux-image-generic-64k | <5.8.0.53.58 | 5.8.0.53.58 |
=20.10 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.8.0.53.58 | 5.8.0.53.58 |
=20.10 | ||
All of | ||
ubuntu/linux-image-gke | <5.8.0.1031.31 | 5.8.0.1031.31 |
=20.10 | ||
All of | ||
ubuntu/linux-image-kvm | <5.8.0.1027.29 | 5.8.0.1027.29 |
=20.10 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.8.0.53.58 | 5.8.0.53.58 |
=20.10 | ||
All of | ||
ubuntu/linux-image-oem-20.04 | <5.8.0.53.58 | 5.8.0.53.58 |
=20.10 | ||
All of | ||
ubuntu/linux-image-oracle | <5.8.0.1029.28 | 5.8.0.1029.28 |
=20.10 | ||
All of | ||
ubuntu/linux-image-raspi | <5.8.0.1024.27 | 5.8.0.1024.27 |
=20.10 | ||
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.8.0.1024.27 | 5.8.0.1024.27 |
=20.10 | ||
All of | ||
ubuntu/linux-image-virtual | <5.8.0.53.58 | 5.8.0.53.58 |
=20.10 | ||
All of | ||
ubuntu/linux-image-5.8.0-53-generic | <5.8.0-53.60~20.04.1 | 5.8.0-53.60~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.8.0-53-generic-64k | <5.8.0-53.60~20.04.1 | 5.8.0-53.60~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.8.0-53-generic-lpae | <5.8.0-53.60~20.04.1 | 5.8.0-53.60~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.8.0-53-lowlatency | <5.8.0-53.60~20.04.1 | 5.8.0-53.60~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-64k-hwe-20.04 | <5.8.0.53.60~20.04.37 | 5.8.0.53.60~20.04.37 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-20.04 | <5.8.0.53.60~20.04.37 | 5.8.0.53.60~20.04.37 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-hwe-20.04 | <5.8.0.53.60~20.04.37 | 5.8.0.53.60~20.04.37 |
=20.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-20.04 | <5.8.0.53.60~20.04.37 | 5.8.0.53.60~20.04.37 |
=20.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-20.04 | <5.8.0.53.60~20.04.37 | 5.8.0.53.60~20.04.37 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)