{"id":41702,"date":"2021-05-19T14:48:06","date_gmt":"2021-05-19T05:48:06","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-4945-2-linux-kernel-raspberry-pi-vulnerabilities\/"},"modified":"2021-05-19T16:34:17","modified_gmt":"2021-05-19T07:34:17","slug":"usn-4945-2-linux-kernel-raspberry-pi-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-4945-2-linux-kernel-raspberry-pi-vulnerabilities\/","title":{"rendered":"USN-4945-2: Linux kernel (Raspberry Pi) vulnerabilities"},"content":{"rendered":"<p>USN-4945-2: Linux kernel (Raspberry Pi) vulnerabilities<\/p>\n<p>USN-4945-1 fixed vulnerabilities in the Linux kernel for Ubuntu<br \/>\n20.04 LTS and Ubuntu 18.04 LTS. This update provides the corresponding<br \/>\nLinux kernel updates targeted specifically for Raspberry Pi devices<br \/>\nin those same Ubuntu Releases.<\/p>\n<p>Original advisory details:<\/p>\n<p>It was discovered that the Nouveau GPU driver in the Linux kernel did not<br \/>\nproperly handle error conditions in some situations. A local attacker could<br \/>\nuse this to cause a denial of service (system crash). (CVE-2020-25639)<\/p>\n<p>Jan Beulich discovered that the Xen netback backend in the Linux kernel did<br \/>\nnot properly handle certain error conditions under paravirtualization. An<br \/>\nattacker in a guest VM could possibly use this to cause a denial of service<br \/>\n(host domain crash). (CVE-2021-28038)<\/p>\n<p>It was discovered that the fastrpc driver in the Linux kernel did not<br \/>\nprevent user space applications from sending kernel RPC messages. A local<br \/>\nattacker could possibly use this to gain elevated privileges.<br \/>\n(CVE-2021-28375)<\/p>\n<p>It was discovered that the Realtek RTL8188EU Wireless device driver in the<br \/>\nLinux kernel did not properly validate ssid lengths in some situations. An<br \/>\nattacker could use this to cause a denial of service (system crash).<br \/>\n(CVE-2021-28660)<\/p>\n<p>It was discovered that the USB\/IP driver in the Linux kernel contained race<br \/>\nconditions during the update of local and shared status. An attacker could<br \/>\nuse this to cause a denial of service (system crash). (CVE-2021-29265)<\/p>\n<p>It was discovered that a race condition existed in the netfilter subsystem<br \/>\nof the Linux kernel when replacing tables. A local attacker could use this<br \/>\nto cause a denial of service (system crash). (CVE-2021-29650)<\/p>\n<p>Arnd Bergmann discovered that the video4linux subsystem in the Linux kernel<br \/>\ndid not properly deallocate memory in some situations. A local attacker<br \/>\ncould use this to cause a denial of service (memory exhaustion).<br \/>\n(CVE-2021-30002)<br \/>\nSource: <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-4945-2\" target=\"_blank\" rel=\"noopener\">USN-4945-2: Linux kernel (Raspberry Pi) vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-4945-2: Linux kernel (Raspberry Pi) vulnerabilities USN-4945-1 fixed vulnerabilities in the Linux kernel for Ubuntu 20.04 LTS and Ubuntu 18.04 LTS. This update provides the corresponding Linux kernel updates targeted specifically for Raspberry Pi devices in those same Ubuntu Releases. Original advisory details: It was discovered that the Nouveau GPU driver in the Linux kernel did not properly handle error conditions in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-25639) Jan Beulich discovered that the Xen netback backend in the Linux kernel did not properly handle certain error conditions under paravirtualization. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash). (CVE-2021-28038) It was discovered that the fastrpc driver in the Linux kernel did not prevent user space applications from sending kernel <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-4945-2-linux-kernel-raspberry-pi-vulnerabilities\/\" title=\"USN-4945-2: Linux kernel (Raspberry Pi) vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-41702","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/41702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=41702"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/41702\/revisions"}],"predecessor-version":[{"id":41703,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/41702\/revisions\/41703"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=41702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=41702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=41702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}