First published: Tue Nov 30 2021(Updated: )
Ilja Van Sprundel discovered that the SCTP implementation in the Linux kernel did not properly perform size validations on incoming packets in some situations. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2021-3655) It was discovered that the AMD Cryptographic Coprocessor (CCP) driver in the Linux kernel did not properly deallocate memory in some error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-3744, CVE-2021-3764) It was discovered that the Aspeed Low Pin Count (LPC) Bus Controller implementation in the Linux kernel did not properly perform boundary checks in some situations, allowing out-of-bounds write access. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. In Ubuntu, this issue only affected systems running armhf kernels. (CVE-2021-42252) Jann Horn discovered that the SELinux subsystem in the Linux kernel did not properly handle subjective credentials for tasks in some situations. On systems where SELinux has been enabled, a local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-43057)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.13.0-1011-raspi-nolpae | <5.13.0-1011.13 | 5.13.0-1011.13 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-22-generic | <5.13.0-22.22 | 5.13.0-22.22 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-virtual | <5.13.0.22.33 | 5.13.0.22.33 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-generic-64k | <5.13.0.22.33 | 5.13.0.22.33 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-generic | <5.13.0.22.33 | 5.13.0.22.33 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-aws | <5.13.0.1007.9 | 5.13.0.1007.9 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1007-gcp | <5.13.0-1007.8 | 5.13.0-1007.8 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1007-aws | <5.13.0-1007.8 | 5.13.0-1007.8 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1008-azure | <5.13.0-1008.9 | 5.13.0-1008.9 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.13.0.1011.17 | 5.13.0.1011.17 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-oem-20.04 | <5.13.0.22.33 | 5.13.0.22.33 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-gke | <5.13.0.1007.8 | 5.13.0.1007.8 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-22-generic-64k | <5.13.0-22.22 | 5.13.0-22.22 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-gcp | <5.13.0.1007.8 | 5.13.0.1007.8 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-oracle | <5.13.0.1010.12 | 5.13.0.1010.12 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-azure | <5.13.0.1008.9 | 5.13.0.1008.9 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-raspi | <5.13.0.1011.17 | 5.13.0.1011.17 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-22-lowlatency | <5.13.0-22.22 | 5.13.0-22.22 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-kvm | <5.13.0.1006.6 | 5.13.0.1006.6 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1011-raspi | <5.13.0-1011.13 | 5.13.0-1011.13 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1006-kvm | <5.13.0-1006.6 | 5.13.0-1006.6 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-22-generic-lpae | <5.13.0-22.22 | 5.13.0-22.22 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-generic-lpae | <5.13.0.22.33 | 5.13.0.22.33 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-lowlatency | <5.13.0.22.33 | 5.13.0.22.33 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1010-oracle | <5.13.0-1010.12 | 5.13.0-1010.12 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-oem-20.04c | <5.13.0.1020.24 | 5.13.0.1020.24 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.13.0-1020-oem | <5.13.0-1020.24 | 5.13.0-1020.24 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is CVE-2021-3655.
The severity of CVE-2021-3655 is not specified.
To fix CVE-2021-3655, update to version 5.13.0-1011.13 or later of the Linux kernel.
Ubuntu 21.10 with Linux kernel versions 5.13.0-1011.13 and earlier are affected by CVE-2021-3655.
You can find more information about CVE-2021-3655 on the Ubuntu security advisory page.