USN-4947-1

Source
https://ubuntu.com/security/notices/USN-4947-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4947-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4947-1
Related
Published
2021-05-11T21:41:11.295334Z
Modified
2021-05-11T21:41:11.295334Z
Summary
linux-oem-5.6 vulnerabilities
Details

Kiyin (尹亮) discovered that the x25 implementation in the Linux kernel contained overflows when handling addresses from user space. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-35519)

It was discovered that the fastrpc driver in the Linux kernel did not prevent user space applications from sending kernel RPC messages. A local attacker could possibly use this to gain elevated privileges. (CVE-2021-28375)

It was discovered that the TIPC protocol implementation in the Linux kernel did not properly validate passed encryption key sizes. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-29646)

It was discovered that a race condition existed in the netfilter subsystem of the Linux kernel when replacing tables. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-29650)

Arnd Bergmann discovered that the video4linux subsystem in the Linux kernel did not properly deallocate memory in some situations. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-30002)

References

Affected packages

Ubuntu:20.04:LTS / linux-oem-5.6

Package

Name
linux-oem-5.6
Purl
pkg:deb/ubuntu/linux-oem-5.6?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.6.0-1056.60

Affected versions

5.*

5.6.0-1007.7
5.6.0-1008.8
5.6.0-1010.10
5.6.0-1011.11
5.6.0-1013.13
5.6.0-1017.17
5.6.0-1018.18
5.6.0-1020.20
5.6.0-1021.21
5.6.0-1023.23
5.6.0-1026.26
5.6.0-1027.27
5.6.0-1028.28
5.6.0-1031.32
5.6.0-1032.33
5.6.0-1033.35
5.6.0-1034.36
5.6.0-1035.37
5.6.0-1036.39
5.6.0-1039.43
5.6.0-1042.46
5.6.0-1047.51
5.6.0-1048.52
5.6.0-1050.54
5.6.0-1052.56
5.6.0-1053.57
5.6.0-1054.58
5.6.0-1055.59

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-buildinfo-5.6.0-1056-oem"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-headers-5.6.0-1056-oem"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-image-unsigned-5.6.0-1056-oem"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-image-unsigned-5.6.0-1056-oem-dbgsym"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-modules-5.6.0-1056-oem"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-oem-5.6-headers-5.6.0-1056"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-oem-5.6-tools-5.6.0-1056"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-oem-5.6-tools-host"
        },
        {
            "binary_version": "5.6.0-1056.60",
            "binary_name": "linux-tools-5.6.0-1056-oem"
        }
    ]
}