First published: Tue Nov 09 2021(Updated: )
It was discovered that the f2fs file system in the Linux kernel did not properly validate metadata in some situations. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19449) It was discovered that the Infiniband RDMA userspace connection manager implementation in the Linux kernel contained a race condition leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possible execute arbitrary code. (CVE-2020-36385) Wolfgang Frisch discovered that the ext4 file system implementation in the Linux kernel contained an integer overflow when handling metadata inode extents. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2021-3428) Benedict Schlueter discovered that the BPF subsystem in the Linux kernel did not properly protect against Speculative Store Bypass (SSB) side- channel attacks in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2021-34556) Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not properly protect against Speculative Store Bypass (SSB) side-channel attacks in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2021-35477) It was discovered that the btrfs file system in the Linux kernel did not properly handle removing a non-existent device id. An attacker with CAP_SYS_ADMIN could use this to cause a denial of service. (CVE-2021-3739) It was discovered that the Qualcomm IPC Router protocol implementation in the Linux kernel did not properly validate metadata in some situations. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2021-3743) It was discovered that the virtual terminal (vt) device implementation in the Linux kernel contained a race condition in its ioctl handling that led to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. (CVE-2021-3753) It was discovered that the Linux kernel did not properly account for the memory usage of certain IPC objects. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-3759) It was discovered that the Aspeed Low Pin Count (LPC) Bus Controller implementation in the Linux kernel did not properly perform boundary checks in some situations, allowing out-of-bounds write access. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. In Ubuntu, this issue only affected systems running armhf kernels. (CVE-2021-42252)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-gkeop | <5.4.0.1026.29 | 5.4.0.1026.29 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic | <5.4.0.90.94 | 5.4.0.90.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oem | <5.4.0.90.94 | 5.4.0.90.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-ibm | <5.4.0.1007.8 | 5.4.0.1007.8 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-90-lowlatency | <5.4.0-90.101 | 5.4.0-90.101 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oem-osp1 | <5.4.0.90.94 | 5.4.0.90.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gke-5.4 | <5.4.0.1055.65 | 5.4.0.1055.65 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1059-aws | <5.4.0-1059.62 | 5.4.0-1059.62 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1049-kvm | <5.4.0-1049.51 | 5.4.0-1049.51 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gkeop-5.4 | <5.4.0.1026.29 | 5.4.0.1026.29 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1055-gke | <5.4.0-1055.58 | 5.4.0-1055.58 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-90-generic-lpae | <5.4.0-90.101 | 5.4.0-90.101 |
=20.04 | ||
All of | ||
ubuntu/linux-image-virtual | <5.4.0.90.94 | 5.4.0.90.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gcp-lts-20.04 | <5.4.0.1057.67 | 5.4.0.1057.67 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1007-ibm | <5.4.0-1007.8 | 5.4.0-1007.8 |
=20.04 | ||
All of | ||
ubuntu/linux-image-ibm-lts-20.04 | <5.4.0.1007.8 | 5.4.0.1007.8 |
=20.04 | ||
All of | ||
ubuntu/linux-image-aws-lts-20.04 | <5.4.0.1059.62 | 5.4.0.1059.62 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1057-gcp | <5.4.0-1057.61 | 5.4.0-1057.61 |
=20.04 | ||
All of | ||
ubuntu/linux-image-azure-lts-20.04 | <5.4.0.1063.61 | 5.4.0.1063.61 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1026-gkeop | <5.4.0-1026.27 | 5.4.0-1026.27 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-90-generic | <5.4.0-90.101 | 5.4.0-90.101 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gke | <5.4.0.1055.65 | 5.4.0.1055.65 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1063-azure | <5.4.0-1063.66 | 5.4.0-1063.66 |
=20.04 | ||
All of | ||
ubuntu/linux-image-kvm | <5.4.0.1049.48 | 5.4.0.1049.48 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.4.0.90.94 | 5.4.0.90.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.4.0.90.94 | 5.4.0.90.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-18.04 | <5.4.0.90.101~18.04.80 | 5.4.0.90.101~18.04.80 |
=18.04 | ||
All of | ||
ubuntu/linux-image-snapdragon-hwe-18.04 | <5.4.0.90.101~18.04.80 | 5.4.0.90.101~18.04.80 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oem | <5.4.0.90.101~18.04.80 | 5.4.0.90.101~18.04.80 |
=18.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.4.0.1059.42 | 5.4.0.1059.42 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oem-osp1 | <5.4.0.90.101~18.04.80 | 5.4.0.90.101~18.04.80 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-hwe-18.04 | <5.4.0.90.101~18.04.80 | 5.4.0.90.101~18.04.80 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1059-aws | <5.4.0-1059.62~18.04.1 | 5.4.0-1059.62~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gkeop-5.4 | <5.4.0.1026.27~18.04.27 | 5.4.0.1026.27~18.04.27 |
=18.04 | ||
All of | ||
ubuntu/linux-image-azure | <5.4.0.1063.43 | 5.4.0.1063.43 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-90-generic-lpae | <5.4.0-90.101~18.04.1 | 5.4.0-90.101~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-18.04 | <5.4.0.90.101~18.04.80 | 5.4.0.90.101~18.04.80 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1026-gkeop | <5.4.0-1026.27~18.04.1 | 5.4.0-1026.27~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-90-generic | <5.4.0-90.101~18.04.1 | 5.4.0-90.101~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.4.0.1057.43 | 5.4.0.1057.43 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-90-lowlatency | <5.4.0-90.101~18.04.1 | 5.4.0-90.101~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1057-gcp | <5.4.0-1057.61~18.04.1 | 5.4.0-1057.61~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-18.04 | <5.4.0.90.101~18.04.80 | 5.4.0.90.101~18.04.80 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1063-azure | <5.4.0-1063.66~18.04.1 | 5.4.0-1063.66~18.04.1 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)