SB2021041397 - Ubuntu update for linux
Published: April 13, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Denial of service (CVE-ID: CVE-2015-1350)
The vulnerability allows a local attacker to cause DoS conditions on the target system.The weakness exists due to underspecified removing of extended privilege attributes caused by incomplete set of requirements for setattr operations. A local can invoke chown or system call, trigger an error in notify_change for filesystem xattrs and cause the ping or Wireshark dumpcap program to crash.
Successful exploitation of the vulnerability results in denial of service.
2) Error handling (CVE-ID: CVE-2017-16644)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists due to an error in the hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through in the Linux kernel. A local attacker can supply a specially crafted USB device, trigger improper error handling and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
3) Information exposure (CVE-ID: CVE-2017-5967)
The vulnerability allows a local non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to information exposure error within the __queue_delayed_work() function in kernel/workqueue.c, within the copyright() function in kernel/time/timer_stats.c, within the print_timer() function in kernel/time/timer_list.c, within the internal_add_timer(), do_init_timer(), __mod_timer(), add_timer_on(), del_timer(), try_to_del_timer_sync(), expire_timers() and init_timer_cpus() functions in kernel/time/timer.c, within the hrtimers_resume(), remove_hrtimer(), hrtimer_start_range_ns(), __hrtimer_init() and __run_hrtimer() functions in kernel/time/hrtimer.c, within the __kthread_queue_delayed_work() function in kernel/kthread.c. A local non-authenticated attacker can gain access to sensitive information.
4) Null pointer dereference (CVE-ID: CVE-2018-13095)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists in the xfs_bmap_extents_to_btree() function in the Extended File System (XFS) component, as defined in the source code file fs/xfs/libxfs/xfs_inode_buf.c due to boundary error when mounting XFS filesystems. A local attacker can access the system, mount an XFS filesystem that submits malicious input, trigger a NULL pointer dereference memory error and cause the affected software to terminate abnormally.
5) Null pointer dereference (CVE-ID: CVE-2019-16231)
The vulnerability allows a local privileged user to perform a denial of service (DoS) attack.
drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
6) Null pointer dereference (CVE-ID: CVE-2019-16232)
The vulnerability allows a local privileged user to perform a denial of service (DoS) attack.
drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
7) Memory leak (CVE-ID: CVE-2019-19061)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the "adis_update_scan_mode_burst()" function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows a local user to cause a denial of service (memory consumption).
8) Race condition (CVE-ID: CVE-2021-20261)
The vulnerability allows a local privileged user to execute arbitrary code.
The vulnerability exists due to a race condition within the set_fdc(), do_format(), user_reset_fdc(), set_geometry(), get_floppy_geometry(), fd_locked_ioctl(), floppy_check_events() and floppy_revalidate() functions in drivers/block/floppy.c. A local privileged user can execute arbitrary code.
9) Resource management error (CVE-ID: CVE-2021-26930)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources when processing service requests to the PV backend within drivers/block/xen-blkback/blkback.c driver in Xen. A local user on the guest OS can perform a denial of service (DoS) attack.
10) Allocation of resources without limits or throttling (CVE-ID: CVE-2021-26931)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to allocation of resources without limits or throttling error within the scsiback_gnttab_data_map_batch() function in drivers/xen/xen-scsiback.c. A local user can perform a denial of service (DoS) attack.
11) Allocation of resources without limits or throttling (CVE-ID: CVE-2021-28038)
The vulnerability allows a local user to a crash the entire system.
The vulnerability exists due to allocation of resources without limits or throttling error within the xenvif_tx_action() function in drivers/net/xen-netback/netback.c. A local user can a crash the entire system.
Remediation
Install update from vendor's website.