USN-5070-1

Source
https://ubuntu.com/security/notices/USN-5070-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5070-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5070-1
Upstream
Related
Published
2021-09-08T23:38:43.699523Z
Modified
2025-10-13T04:35:36Z
Summary
linux, linux-aws, linux-aws-5.11, linux-azure, linux-azure-5.11, linux-gcp, linux-hwe-5.11, linux-kvm, linux-oracle, linux-oracle-5.11, linux-raspi vulnerabilities
Details

Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel allowed a guest VM to disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a guest VM could use this to read or write portions of the host's physical memory. (CVE-2021-3656)

Maxim Levitsky discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel did not properly prevent a guest VM from enabling AVIC in nested guest VMs. An attacker in a guest VM could use this to write to portions of the host's physical memory. (CVE-2021-3653)

It was discovered that the Linux kernel did not properly enforce certain types of entries in the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. An attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2020-26541)

It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. An attacker who could start and control a VM could possibly use this to expose sensitive information or execute arbitrary code. (CVE-2021-22543)

Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol implementation in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-34693)

Murray McAllister discovered that the joystick device interface in the Linux kernel did not properly validate data passed via an ioctl(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (CVE-2021-3612)

It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly compute the access permissions for shadow pages in some situations. A local attacker could use this to cause a denial of service. (CVE-2021-38198)

It was discovered that the perf subsystem in the Linux kernel for the PowerPC architecture contained a null pointer dereference in some situations. An attacker could use this to cause a denial of service (system crash). (CVE-2021-38200)

Ben Greear discovered that the mac80211 subsystem in the Linux kernel contained a null pointer dereference in some situations. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2021-38206)

It was discovered that the Xilinx LL TEMAC device driver in the Linux kernel did not properly calculate the number of buffers to be used in certain situations. A remote attacker could use this to cause a denial of service (system crash). (CVE-2021-38207)

References

Affected packages

Ubuntu:20.04:LTS / linux-aws-5.11

Package

Name
linux-aws-5.11
Purl
pkg:deb/ubuntu/linux-aws-5.11@5.11.0-1017.18~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.11.0-1017.18~20.04.1

Affected versions

5.*

5.11.0-1009.9~20.04.2
5.11.0-1014.15~20.04.1
5.11.0-1016.17~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-aws-5.11-cloud-tools-5.11.0-1017",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-aws-5.11-headers-5.11.0-1017",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-aws-5.11-tools-5.11.0-1017",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.11.0-1017-aws",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.11.0-1017-aws",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.11.0-1017-aws",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-image-5.11.0-1017-aws",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.11.0-1017-aws",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-modules-extra-5.11.0-1017-aws",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.11.0-1017-aws",
            "binary_version": "5.11.0-1017.18~20.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2020-26541"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3612"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3653"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3656"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L",
                    "type": "CVSS_V4"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-22543"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-34693"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38198"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38200"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38206"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38207"
        }
    ],
    "ecosystem": "Ubuntu:20.04:LTS"
}

Ubuntu:20.04:LTS / linux-azure-5.11

Package

Name
linux-azure-5.11
Purl
pkg:deb/ubuntu/linux-azure-5.11@5.11.0-1015.16~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.11.0-1015.16~20.04.1

Affected versions

5.*

5.11.0-1007.7~20.04.2
5.11.0-1012.13~20.04.1
5.11.0-1013.14~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-azure-5.11-cloud-tools-5.11.0-1015",
            "binary_version": "5.11.0-1015.16~20.04.1"
        },
        {
            "binary_name": "linux-azure-5.11-headers-5.11.0-1015",
            "binary_version": "5.11.0-1015.16~20.04.1"
        },
        {
            "binary_name": "linux-azure-5.11-tools-5.11.0-1015",
            "binary_version": "5.11.0-1015.16~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.11.0-1015-azure",
            "binary_version": "5.11.0-1015.16~20.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.11.0-1015-azure",
            "binary_version": "5.11.0-1015.16~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.11.0-1015-azure",
            "binary_version": "5.11.0-1015.16~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.11.0-1015-azure",
            "binary_version": "5.11.0-1015.16~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.11.0-1015-azure",
            "binary_version": "5.11.0-1015.16~20.04.1"
        },
        {
            "binary_name": "linux-modules-extra-5.11.0-1015-azure",
            "binary_version": "5.11.0-1015.16~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.11.0-1015-azure",
            "binary_version": "5.11.0-1015.16~20.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2020-26541"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3612"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3653"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3656"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L",
                    "type": "CVSS_V4"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-22543"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-34693"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38198"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38200"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38206"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38207"
        }
    ],
    "ecosystem": "Ubuntu:20.04:LTS"
}

Ubuntu:20.04:LTS / linux-hwe-5.11

Package

Name
linux-hwe-5.11
Purl
pkg:deb/ubuntu/linux-hwe-5.11@5.11.0-34.36~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.11.0-34.36~20.04.1

Affected versions

5.*

5.11.0-22.23~20.04.1
5.11.0-25.27~20.04.1
5.11.0-27.29~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "block-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "block-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "block-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "crypto-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "crypto-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "crypto-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "dasd-extra-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "dasd-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fat-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fat-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fat-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fb-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "firewire-core-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "floppy-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fs-core-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fs-core-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fs-core-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fs-secondary-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fs-secondary-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "fs-secondary-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "input-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "input-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "input-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "ipmi-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "ipmi-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "ipmi-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "kernel-image-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "kernel-image-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "kernel-image-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.11.0-34-generic",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.11.0-34-generic-64k",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.11.0-34-generic-lpae",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.11.0-34-lowlatency",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.11.0-34-generic",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.11.0-34-lowlatency",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.11.0-34-generic",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.11.0-34-generic-64k",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.11.0-34-generic-lpae",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.11.0-34-lowlatency",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-cloud-tools-5.11.0-34",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-cloud-tools-common",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-headers-5.11.0-34",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-source-5.11.0",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-tools-5.11.0-34",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-tools-common",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-tools-host",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-udebs-generic",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-udebs-generic-64k",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.11-udebs-generic-lpae",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-image-5.11.0-34-generic",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-image-5.11.0-34-generic-lpae",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.11.0-34-generic",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.11.0-34-generic-64k",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.11.0-34-lowlatency",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.11.0-34-generic",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.11.0-34-generic-64k",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.11.0-34-generic-lpae",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.11.0-34-lowlatency",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-modules-extra-5.11.0-34-generic",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.11.0-34-generic",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.11.0-34-generic-64k",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.11.0-34-generic-lpae",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.11.0-34-lowlatency",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "md-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "md-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "md-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "message-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "message-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "mouse-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "mouse-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "mouse-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "multipath-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "multipath-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "multipath-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nfs-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nfs-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nfs-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-pcmcia-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-shared-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-shared-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-shared-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-usb-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-usb-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "nic-usb-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "parport-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "parport-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "parport-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "pata-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "pcmcia-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "pcmcia-storage-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "plip-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "plip-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "plip-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "ppp-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "ppp-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "ppp-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "sata-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "sata-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "sata-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "scsi-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "scsi-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "scsi-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "serial-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "storage-core-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "storage-core-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "storage-core-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "usb-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "usb-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "usb-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "virtio-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "virtio-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "vlan-modules-5.11.0-34-generic-64k-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "vlan-modules-5.11.0-34-generic-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        },
        {
            "binary_name": "vlan-modules-5.11.0-34-generic-lpae-di",
            "binary_version": "5.11.0-34.36~20.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2020-26541"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3612"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3653"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3656"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L",
                    "type": "CVSS_V4"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-22543"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-34693"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38198"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38200"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38206"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38207"
        }
    ],
    "ecosystem": "Ubuntu:20.04:LTS"
}

Ubuntu:20.04:LTS / linux-oracle-5.11

Package

Name
linux-oracle-5.11
Purl
pkg:deb/ubuntu/linux-oracle-5.11@5.11.0-1017.18~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.11.0-1017.18~20.04.1

Affected versions

5.*

5.11.0-1008.8~20.04.1
5.11.0-1013.14~20.04.1
5.11.0-1016.17~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-5.11.0-1017-oracle",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.11.0-1017-oracle",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.11.0-1017-oracle",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.11.0-1017-oracle",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-modules-extra-5.11.0-1017-oracle",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-oracle-5.11-headers-5.11.0-1017",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-oracle-5.11-tools-5.11.0-1017",
            "binary_version": "5.11.0-1017.18~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.11.0-1017-oracle",
            "binary_version": "5.11.0-1017.18~20.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2020-26541"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3612"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3653"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-3656"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L",
                    "type": "CVSS_V4"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-22543"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-34693"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38198"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38200"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38206"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2021-38207"
        }
    ],
    "ecosystem": "Ubuntu:20.04:LTS"
}