First published: Fri Apr 14 2023(Updated: )
It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-3669) It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. (CVE-2022-2196) Gerald Lee discovered that the USB Gadget file system implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-4382) It was discovered that the RNDIS USB driver in the Linux kernel contained an integer overflow vulnerability. A local attacker with physical access could plug in a malicious USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-23559)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.4.0-1060-bluefield | <5.4.0-1060.66 | 5.4.0-1060.66 |
=20.04 | ||
All of | ||
ubuntu/linux-image-bluefield | <5.4.0.1060.55 | 5.4.0.1060.55 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is CVE-2021-3669.
The severity of CVE-2021-3669 is not specified in the advisory.
CVE-2021-3669 can be exploited by a local attacker to cause a denial of service by exhausting memory.
The recommended remedy for CVE-2021-3669 is to update to Linux kernel version 5.4.0-1060.66 or later.
More information about CVE-2021-3669 can be found at the following link: [CVE-2021-3669](https://ubuntu.com/security/CVE-2021-3669)