QID 198328

Date Published: 2021-04-15

QID 198328: Ubuntu Security Notification for Linux kernel (OEM) vulnerabilities (USN-4912-1)

The bpf jit compiler for x86 in the linux kernel did not properly validate computation of branch displacements in some situations
A race condition existed in the binder ipc implementation in the linux kernel, leading to a use-after-free vulnerability
The hid multitouch implementation within the linux kernel did not properly validate input events in some situations
The eventpoll (aka epoll) implementation in the linux kernel contained a logic error that could lead to a use after free vulnerability
A race condition existed in the perf subsystem of the linux kernel, leading to a use-after-free vulnerability
The frame buffer implementation in the linux kernel did not properly handle some edge cases in software scrollback
A race condition existed in the hugetlb sysctl implementation in the linux kernel
The geneve tunnel implementation in the linux kernel when combined with ipsec did not properly select ip routes in some situations
Speakup screen reader driver in the linux kernel did not correctly handle setting line discipline in some situations
The marvell wifi-ex device driver in the linux kernel did not properly validate ad-hoc ssids
The bpf implementation in the linux kernel did not properly validate attributes in the getsockopt bpf hook
The kprobes subsystem in the linux kernel did not properly detect linker padding in some situations
The nfs implementation in the linux kernel did not properly prevent access outside of an nfs export that is a subdirectory of a file system

A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code (CVE-2021-29154)
A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code (CVE-2020-0423)
A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code (CVE-2020-0465)
A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code (CVE-2020-0466)
An attacker with access to the perf subsystem could use this to cause a denial of service (system crash) or possibly execute arbitrary code (CVE-2020-14351)
A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code (CVE-2020-14390)
A privileged attacker could use this to cause a denial of service (system crash) (CVE-2020-25285)
An attacker could use this to expose sensitive information (unencrypted network traffic) (CVE-2020-25645)
A local attacker could use this to cause a denial of service (system crash) (CVE-2020-27830)
A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code (CVE-2020-36158)
A local attacker could possibly use this to cause a denial of service (system crash) (CVE-2021-20194)
A privileged attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (CVE-2021-3411)
An attacker could possibly use this to bypass NFS access restrictions (CVE-2021-3178)

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Refer to Ubuntu advisory: USN-4912-1 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    USN-4912-1 Ubuntu Linux URL Logo usn.ubuntu.com/4912-1