First published: Thu Nov 11 2021(Updated: )
It was discovered that the AMD Cryptographic Coprocessor (CCP) driver in the Linux kernel did not properly deallocate memory in some error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-3744, CVE-2021-3764) It was discovered that an integer overflow could be triggered in the eBPF implementation in the Linux kernel when preallocating objects for stack maps. A privileged local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-41864)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-oem-20.04d | <5.14.0.1007.7 | 5.14.0.1007.7 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.14.0-1007-oem | <5.14.0-1007.7 | 5.14.0-1007.7 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of CVE-2021-3744 is not mentioned in the vulnerability report.
A local attacker can exploit CVE-2021-3744 to cause a denial of service by causing memory exhaustion.
The remedy for the Linux kernel vulnerabilities in Ubuntu 20.04 with version 5.14.0.1007.7 is to update to the version 5.14.0.1007.7 of the Linux kernel image.
The remedy for the Linux kernel vulnerabilities in Ubuntu 20.04 with version 5.14.0-1007.7 is to update to the version 5.14.0-1007.7 of the Linux kernel image.
For more information about the Linux kernel vulnerabilities, you can visit the following references: [CVE-2021-3764](https://ubuntu.com/security/CVE-2021-3764), [CVE-2021-41864](https://ubuntu.com/security/CVE-2021-41864), [CVE-2021-3744](https://ubuntu.com/security/CVE-2021-3744).