SB2021010620 - Ubuntu update for linux



SB2021010620 - Ubuntu update for linux

Published: January 6, 2021

Security Bulletin ID SB2021010620
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2020-12912)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in the Running Average Power Limit (RAPL) interface. A local user can gain unauthorized access to sensitive information on the system.


2) Incorrect calculation (CVE-ID: CVE-2020-29534)

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to incorrect calculation within the __put_task_struct() and copy_process() functions in kernel/fork.c, within the __io_cqring_fill_event(), io_dismantle_req(), io_req_free_batch_finish(), io_req_free_batch(), io_close_prep(), io_req_drop_files(), io_req_set_file(), io_init_req(), io_submit_sqes(), io_sq_thread(), io_uring_alloc_task_context(), io_sq_offload_start(), io_wq_files_match(), io_uring_cancel_files(), io_cancel_task_cb(), SYSCALL_DEFINE6() and io_uring_get_fd() functions in fs/io_uring.c, within the exit_files() function in fs/file.c, within the bprm_execve() function in fs/exec.c. A local user can execute arbitrary code.


Remediation

Install update from vendor's website.