Ubuntu 20.04 LTS : Linux kernel (OEM) vulnerabilities (USN-5115-1)

high Nessus Plugin ID 154279

Synopsis

The remote Ubuntu host is missing one or more security updates.

Description

The remote Ubuntu 20.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-5115-1 advisory.

- u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150 (CVE-2020-3702)

- A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
(CVE-2021-3679)

- In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db. (CVE-2021-33624)

- In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack. (CVE-2021-34556)

- In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.
(CVE-2021-35477)

- hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.
(CVE-2021-37159)

- In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability. (CVE-2021-38166)

- drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations. (CVE-2021-38204)

- drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer). (CVE-2021-38205)

- A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13. (CVE-2021-40490)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://ubuntu.com/security/notices/USN-5115-1

Plugin Details

Severity: High

ID: 154279

File Name: ubuntu_USN-5115-1.nasl

Version: 1.3

Type: local

Agent: unix

Published: 10/20/2021

Updated: 1/7/2022

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

CVSS Score Source: CVE-2021-42008

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:linux-buildinfo-5.10.0-1050-oem, p-cpe:/a:canonical:ubuntu_linux:linux-headers-5.10.0-1050-oem, p-cpe:/a:canonical:ubuntu_linux:linux-headers-oem-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-headers-oem-20.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-headers-oem-20.04b, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.10.0-1050-oem, p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-20.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-20.04b, p-cpe:/a:canonical:ubuntu_linux:linux-image-unsigned-5.10.0-1050-oem, p-cpe:/a:canonical:ubuntu_linux:linux-modules-5.10.0-1050-oem, p-cpe:/a:canonical:ubuntu_linux:linux-oem-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-oem-20.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-oem-20.04b, p-cpe:/a:canonical:ubuntu_linux:linux-oem-5.10-headers-5.10.0-1050, p-cpe:/a:canonical:ubuntu_linux:linux-oem-5.10-tools-5.10.0-1050, p-cpe:/a:canonical:ubuntu_linux:linux-oem-5.10-tools-host, p-cpe:/a:canonical:ubuntu_linux:linux-tools-5.10.0-1050-oem, p-cpe:/a:canonical:ubuntu_linux:linux-tools-oem-20.04, p-cpe:/a:canonical:ubuntu_linux:linux-tools-oem-20.04-edge, p-cpe:/a:canonical:ubuntu_linux:linux-tools-oem-20.04b

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/20/2021

Vulnerability Publication Date: 9/8/2020

Reference Information

CVE: CVE-2020-3702, CVE-2021-3679, CVE-2021-3732, CVE-2021-3739, CVE-2021-3743, CVE-2021-3753, CVE-2021-3759, CVE-2021-33624, CVE-2021-34556, CVE-2021-35477, CVE-2021-37159, CVE-2021-38166, CVE-2021-38204, CVE-2021-38205, CVE-2021-40490, CVE-2021-42008

USN: 5115-1