First published: Wed Mar 29 2023(Updated: )
It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-3669) It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. (CVE-2022-2196) Gerald Lee discovered that the USB Gadget file system implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-4382) It was discovered that the RNDIS USB driver in the Linux kernel contained an integer overflow vulnerability. A local attacker with physical access could plug in a malicious USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-23559)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-aws | <5.4.0.1099.77 | 5.4.0.1099.77 |
=18.04 | ||
All of | ||
ubuntu/linux-image-snapdragon-hwe-18.04 | <5.4.0.146.163~18.04.117 | 5.4.0.146.163~18.04.117 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1099-aws | <5.4.0-1099.107~18.04.1 | 5.4.0-1099.107~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oem | <5.4.0.146.163~18.04.117 | 5.4.0.146.163~18.04.117 |
=18.04 | ||
All of | ||
ubuntu/linux-image-raspi-hwe-18.04 | <5.4.0.1082.79 | 5.4.0.1082.79 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1098-oracle | <5.4.0-1098.107~18.04.1 | 5.4.0-1098.107~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1105-azure | <5.4.0-1105.111~18.04.1 | 5.4.0-1105.111~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-ibm | <5.4.0.1046.57 | 5.4.0.1046.57 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oem-osp1 | <5.4.0.146.163~18.04.117 | 5.4.0.146.163~18.04.117 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-18.04 | <5.4.0.146.163~18.04.117 | 5.4.0.146.163~18.04.117 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-hwe-18.04 | <5.4.0.146.163~18.04.117 | 5.4.0.146.163~18.04.117 |
=18.04 | ||
All of | ||
ubuntu/linux-image-azure | <5.4.0.1105.78 | 5.4.0.1105.78 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1102-gcp | <5.4.0-1102.111~18.04.2 | 5.4.0-1102.111~18.04.2 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-146-generic-lpae | <5.4.0-146.163~18.04.1 | 5.4.0-146.163~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-18.04 | <5.4.0.146.163~18.04.117 | 5.4.0.146.163~18.04.117 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.4.0.1102.78 | 5.4.0.1102.78 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oracle | <5.4.0.1098.107~18.04.70 | 5.4.0.1098.107~18.04.70 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-146-generic | <5.4.0-146.163~18.04.1 | 5.4.0-146.163~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1046-ibm | <5.4.0-1046.51~18.04.1 | 5.4.0-1046.51~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-18.04 | <5.4.0.146.163~18.04.117 | 5.4.0.146.163~18.04.117 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-146-lowlatency | <5.4.0-146.163~18.04.1 | 5.4.0-146.163~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1082-raspi | <5.4.0-1082.93~18.04.1 | 5.4.0-1082.93~18.04.1 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of CVE-2021-3669 is moderate.
CVE-2021-3669 can be exploited by a local attacker to cause a denial of service by exhausting memory.
Ubuntu 18.04 is affected by CVE-2021-3669.
To fix CVE-2021-3669, update the linux-image-aws package to version 5.4.0.1099.77 or later.
You can find more information about CVE-2021-3669 on the Ubuntu Security Advisory page.