Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.845108
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5120-1)
Summary:The remote host is missing an update for the 'linux-azure-5.8' package(s) announced via the USN-5120-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-azure-5.8' package(s) announced via the USN-5120-1 advisory.

Vulnerability Insight:
It was discovered that the f2fs file system in the Linux kernel did not
properly validate metadata in some situations. An attacker could use this
to construct a malicious f2fs image that, when mounted and operated on,
could cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-19449)

It was discovered that the Linux kernel did not properly enforce certain
types of entries in the Secure Boot Forbidden Signature Database (aka dbx)
protection mechanism. An attacker could use this to bypass UEFI Secure Boot
restrictions. (CVE-2020-26541)

It was discovered that the KVM hypervisor implementation for AMD processors
in the Linux kernel did not ensure enough processing time was given to
perform cleanups of large SEV VMs. A local attacker could use this to cause
a denial of service (soft lockup). (CVE-2020-36311)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly perform reference counting in some situations,
leading to a use-after-free vulnerability. An attacker who could start and
control a VM could possibly use this to expose sensitive information or
execute arbitrary code. (CVE-2021-22543)

Murray McAllister discovered that the joystick device interface in the
Linux kernel did not properly validate data passed via an ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code on systems with a joystick device
registered. (CVE-2021-3612)

It was discovered that the Linux kernel did not properly account for the
memory usage of certain IPC objects. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2021-3759)

Michael Wakabayashi discovered that the NFSv4 client implementation in the
Linux kernel did not properly order connection setup operations. An
attacker controlling a remote NFS server could use this to cause a denial
of service on the client. (CVE-2021-38199)

It was discovered that the Xilinx LL TEMAC device driver in the Linux
kernel did not properly calculate the number of buffers to be used in
certain situations. A remote attacker could use this to cause a denial of
service (system crash). (CVE-2021-38207)

It was discovered that the ext4 file system in the Linux kernel contained a
race condition when writing xattrs to an inode. A local attacker could use
this to cause a denial of service or possibly gain administrative
privileges. (CVE-2021-40490)

Affected Software/OS:
'linux-azure-5.8' package(s) on Ubuntu 20.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
Common Vulnerability Exposure (CVE) ID: CVE-2020-26541
https://lkml.org/lkml/2020/9/15/1871
Common Vulnerability Exposure (CVE) ID: CVE-2020-36311
Debian Security Information: DSA-4941 (Google Search)
https://www.debian.org/security/2021/dsa-4941
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-22543
FEDORA-2021-95f2f1cfc7
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/
FEDORA-2021-fe826f202e
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/
[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE
http://www.openwall.com/lists/oss-security/2021/06/26/1
https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584
https://security.netapp.com/advisory/ntap-20210708-0002/
Common Vulnerability Exposure (CVE) ID: CVE-2021-3612
https://security.netapp.com/advisory/ntap-20210805-0005/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/
https://bugzilla.redhat.com/show_bug.cgi?id=1974079
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/
https://www.oracle.com/security-alerts/cpujul2022.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-3759
https://access.redhat.com/security/cve/CVE-2021-3759
https://bugzilla.redhat.com/show_bug.cgi?id=1999675
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-38199
Debian Security Information: DSA-4978 (Google Search)
https://www.debian.org/security/2021/dsa-4978
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c
Common Vulnerability Exposure (CVE) ID: CVE-2021-38207
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d
Common Vulnerability Exposure (CVE) ID: CVE-2021-40490
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.