QID 198304

Date Published: 2021-03-31

QID 198304: Ubuntu Security Notification for Linux-oem-5.10 Vulnerabilities (USN-4884-1)

it was discovered that the BPF implementation in the Linux kernel did not properly validate attributes in the getsockopt BPF hook.

It was discovered that the priority inheritance futex implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability.

It was discovered that the network block device (nbd) driver in the Linux kernel contained a use-after-free vulnerability during device setup.

A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2021-20194)

A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3347)

A local attacker with access to the nbd device could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3348)

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Refer to Ubuntu advisory USN-4884-1 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 198304

    Software Advisories
    Advisory ID Software Component Link
    USN-4884-1 20.04 (focal) on src linux-image-5.10.0-1017-oem URL Logo launchpad.net/ubuntu/+source/linux-oem-5.10/5.10.0-1017.18
    USN-4884-1 20.04 (focal) on src linux-image-oem-20.04b URL Logo launchpad.net/ubuntu/+source/linux-oem-5.10/5.10.0-1017.18