Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 13 |
CVE-ID | CVE-2020-26147 CVE-2020-26558 CVE-2021-0129 CVE-2021-28972 CVE-2021-33034 CVE-2021-34693 CVE-2021-3483 CVE-2021-3564 CVE-2021-3612 CVE-2021-3679 CVE-2021-38204 CVE-2021-42008 CVE-2021-45485 |
CWE-ID | CWE-20 CWE-254 CWE-284 CWE-119 CWE-416 CWE-908 CWE-415 CWE-787 CWE-400 CWE-200 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #12 is available. |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system linux-image-virtual-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-1099-aws (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-kvm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-219-generic (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-1135-aws (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-1100-kvm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-219-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-aws (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-virtual (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 13 vulnerabilities.
EUVDB-ID: #VU53172
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-26147
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. A remote attacker on the local network can inject packets and/or exfiltrate selected fragments
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53579
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-26558
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to an impersonation in the Passkey Entry protocol flaw. A remote attacker on the local network can perform a man-in-the-middle (MITM) attack and impersonate the initiating device without any previous knowledge.
Note: This vulnerability affects the following specifications:
Mitigation
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54202
Risk: Low
CVSSv4.0: 4.5 [CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-0129
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote authenticated attacker on the local network can bypass implemented security restrictions and enable information disclosure
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56819
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-28972
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the drivers/pci/hotplug/rpadlpar_sysfs.c. A local administrator can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54454
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-33034
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in net/bluetooth/hci_event.c when destroying an hci_chan. A local user can escalate privileges on the system.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55263
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-34693
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63659
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3483
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the Nosy driver in the Linux kernel. A local user can trigger use-after-free and to escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63660
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3564
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service attack.
The vulnerability exists due to bluetooth subsystem in the Linux kernel does not properly handle HCI device detach events. An attacker with physical access to the system can trigger double free error and perform a denial of service attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55231
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3612
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in joystick devices subsystem in Linux kernel. A local user can make a specially crafted JSIOCSBTNMAP IOCTL call, trigger out-of-bounds write and execute arbitrary code with escalated privileges.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63664
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3679
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to lack of CPU resource in the Linux kernel tracing module functionality when using trace ring buffer in a specific way. A privileged local user (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63666
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-38204
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the drivers/usb/host/max3421-hcd.c in the Linux kernel. An attacker with physical access to the system can remove a MAX-3421 USB device to perform a denial of service attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63669
Risk: Low
CVSSv4.0: 7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2021-42008
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the decode_data() function in drivers/net/hamradio/6pack.c in the Linux kernel. A local user can send input from a process that has the CAP_NET_ADMIN capability and escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU63668
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-45485
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to an error in the IPv6 implementation in the Linux kernel. A remote attacker can gain access to sensitive information.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1099-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.219.226
linux-image-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-generic (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1135-aws (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-1100-kvm (Ubuntu package): before 4.4.0.219.226
linux-image-4.4.0-219-lowlatency (Ubuntu package): before 4.4.0.219.226
linux-image-aws (Ubuntu package): before 4.4.0.219.226
linux-image-generic (Ubuntu package): before 4.4.0.219.226
linux-image-virtual (Ubuntu package): before 4.4.0.219.226
CPE2.3https://ubuntu.com/security/notices/USN-5299-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.