Ubuntu 18.04 LTS / 20.04 LTS : Linux kernel (Raspberry Pi) vulnerabilities (USN-5091-2)

high Nessus Plugin ID 153801

Synopsis

The remote Ubuntu host is missing one or more security updates.

Description

The remote Ubuntu 18.04 LTS / 20.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-5091-2 advisory.

- A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
(CVE-2021-3679)

- In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db. (CVE-2021-33624)

- ** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE:
the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.
(CVE-2021-38160)

- fs/nfs/nfs4client.c in the Linux kernel before 5.13.4 has incorrect connection-setup ordering, which allows operators of remote NFSv4 servers to cause a denial of service (hanging of mounts) by arranging for those servers to be unreachable during trunking detection. (CVE-2021-38199)

- drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations. (CVE-2021-38204)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://ubuntu.com/security/notices/USN-5091-2

Plugin Details

Severity: High

ID: 153801

File Name: ubuntu_USN-5091-2.nasl

Version: 1.2

Type: local

Agent: unix

Published: 9/30/2021

Updated: 9/30/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

CVSS Score Source: CVE-2021-38160

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:canonical:ubuntu_linux:18.04:-:lts, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:linux-buildinfo-5.4.0-1044-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-headers-5.4.0-1044-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-headers-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-headers-raspi-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-headers-raspi-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-headers-raspi2, p-cpe:/a:canonical:ubuntu_linux:linux-headers-raspi2-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-headers-raspi2-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1044-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2, p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-modules-5.4.0-1044-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-raspi-5.4-headers-5.4.0-1044, p-cpe:/a:canonical:ubuntu_linux:linux-raspi-5.4-tools-5.4.0-1044, p-cpe:/a:canonical:ubuntu_linux:linux-raspi-headers-5.4.0-1044, p-cpe:/a:canonical:ubuntu_linux:linux-raspi-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-raspi-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-raspi-tools-5.4.0-1044, p-cpe:/a:canonical:ubuntu_linux:linux-raspi2, p-cpe:/a:canonical:ubuntu_linux:linux-raspi2-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-raspi2-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-tools-5.4.0-1044-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-tools-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-tools-raspi-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-tools-raspi-hwe-18.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-tools-raspi2, p-cpe:/a:canonical:ubuntu_linux:linux-tools-raspi2-hwe-18.04, p-cpe:/a:canonical:ubuntu_linux:linux-tools-raspi2-hwe-18.04-edge

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 9/30/2021

Vulnerability Publication Date: 6/23/2021

Reference Information

CVE: CVE-2021-3679, CVE-2021-33624, CVE-2021-38160, CVE-2021-38199, CVE-2021-38204

USN: 5091-2