It was discovered that the bluetooth subsystem in the Linux kernel did not properly perform access control. An authenticated attacker could possibly use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)
Michael Brown discovered that the Xen netback driver in the Linux kernel did not properly handle malformed packets from a network PV frontend, leading to a use-after-free vulnerability. An attacker in a guest VM could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-28691)
It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device initialization failure, leading to a double-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3564)
It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device detach events, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3573)
It was discovered that the NFC implementation in the Linux kernel did not properly handle failed connect events leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service. (CVE-2021-38208)
{ "binaries": [ { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-aws-5.8-cloud-tools-5.8.0-1042" }, { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-aws-5.8-headers-5.8.0-1042" }, { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-aws-5.8-tools-5.8.0-1042" }, { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-buildinfo-5.8.0-1042-aws" }, { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-cloud-tools-5.8.0-1042-aws" }, { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-headers-5.8.0-1042-aws" }, { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-image-5.8.0-1042-aws" }, { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-modules-5.8.0-1042-aws" }, { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-modules-extra-5.8.0-1042-aws" }, { "binary_version": "5.8.0-1042.44~20.04.1", "binary_name": "linux-tools-5.8.0-1042-aws" } ], "availability": "No subscription required" }
{ "cves_map": { "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2020-26558" }, { "severity": [ { "score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" }, { "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-0129" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-3564" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-3573" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-28691" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-38208" } ], "ecosystem": "Ubuntu:20.04:LTS" } }
{ "binaries": [ { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-azure-5.8-cloud-tools-5.8.0-1040" }, { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-azure-5.8-headers-5.8.0-1040" }, { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-azure-5.8-tools-5.8.0-1040" }, { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-buildinfo-5.8.0-1040-azure" }, { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-cloud-tools-5.8.0-1040-azure" }, { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-headers-5.8.0-1040-azure" }, { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-image-unsigned-5.8.0-1040-azure" }, { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-modules-5.8.0-1040-azure" }, { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-modules-extra-5.8.0-1040-azure" }, { "binary_version": "5.8.0-1040.43~20.04.1", "binary_name": "linux-tools-5.8.0-1040-azure" } ], "availability": "No subscription required" }
{ "cves_map": { "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2020-26558" }, { "severity": [ { "score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" }, { "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-0129" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-3564" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-3573" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-28691" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-38208" } ], "ecosystem": "Ubuntu:20.04:LTS" } }
{ "binaries": [ { "binary_version": "5.8.0-1039.41", "binary_name": "linux-buildinfo-5.8.0-1039-gcp" }, { "binary_version": "5.8.0-1039.41", "binary_name": "linux-gcp-5.8-headers-5.8.0-1039" }, { "binary_version": "5.8.0-1039.41", "binary_name": "linux-gcp-5.8-tools-5.8.0-1039" }, { "binary_version": "5.8.0-1039.41", "binary_name": "linux-headers-5.8.0-1039-gcp" }, { "binary_version": "5.8.0-1039.41", "binary_name": "linux-image-unsigned-5.8.0-1039-gcp" }, { "binary_version": "5.8.0-1039.41", "binary_name": "linux-modules-5.8.0-1039-gcp" }, { "binary_version": "5.8.0-1039.41", "binary_name": "linux-modules-extra-5.8.0-1039-gcp" }, { "binary_version": "5.8.0-1039.41", "binary_name": "linux-tools-5.8.0-1039-gcp" } ], "availability": "No subscription required" }
{ "cves_map": { "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2020-26558" }, { "severity": [ { "score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" }, { "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-0129" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-3564" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-3573" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-28691" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-38208" } ], "ecosystem": "Ubuntu:20.04:LTS" } }
{ "binaries": [ { "binary_version": "5.8.0-1038.39~20.04.1", "binary_name": "linux-buildinfo-5.8.0-1038-oracle" }, { "binary_version": "5.8.0-1038.39~20.04.1", "binary_name": "linux-headers-5.8.0-1038-oracle" }, { "binary_version": "5.8.0-1038.39~20.04.1", "binary_name": "linux-image-unsigned-5.8.0-1038-oracle" }, { "binary_version": "5.8.0-1038.39~20.04.1", "binary_name": "linux-modules-5.8.0-1038-oracle" }, { "binary_version": "5.8.0-1038.39~20.04.1", "binary_name": "linux-modules-extra-5.8.0-1038-oracle" }, { "binary_version": "5.8.0-1038.39~20.04.1", "binary_name": "linux-oracle-5.8-headers-5.8.0-1038" }, { "binary_version": "5.8.0-1038.39~20.04.1", "binary_name": "linux-oracle-5.8-tools-5.8.0-1038" }, { "binary_version": "5.8.0-1038.39~20.04.1", "binary_name": "linux-tools-5.8.0-1038-oracle" } ], "availability": "No subscription required" }
{ "cves_map": { "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2020-26558" }, { "severity": [ { "score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" }, { "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-0129" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-3564" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-3573" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-28691" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2021-38208" } ], "ecosystem": "Ubuntu:20.04:LTS" } }