USN-5073-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-5073-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5073-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5073-2
Related
Published
2021-09-17T06:27:26.141097Z
Modified
2021-09-17T06:27:26.141097Z
Summary
linux-gcp, linux-gcp-4.15 vulnerabilities
Details

Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel allowed a guest VM to disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a guest VM could use this to read or write portions of the host's physical memory. (CVE-2021-3656)

Maxim Levitsky discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel did not properly prevent a guest VM from enabling AVIC in nested guest VMs. An attacker in a guest VM could use this to write to portions of the host's physical memory. (CVE-2021-3653)

Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol implementation in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-34693)

Murray McAllister discovered that the joystick device interface in the Linux kernel did not properly validate data passed via an ioctl(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (CVE-2021-3612)

It was discovered that the Virtio console implementation in the Linux kernel did not properly validate input lengths in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2021-38160)

References

Affected packages

Ubuntu:Pro:16.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp@4.15.0-1108.122~16.04.1?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1108.122~16.04.1

Affected versions

4.*

4.10.0-1004.4
4.10.0-1006.6
4.10.0-1007.7
4.10.0-1008.8
4.10.0-1009.9
4.13.0-1002.5
4.13.0-1006.9
4.13.0-1007.10
4.13.0-1008.11
4.13.0-1011.15
4.13.0-1012.16
4.13.0-1013.17
4.13.0-1015.19
4.13.0-1017.21
4.13.0-1019.23
4.15.0-1014.14~16.04.1
4.15.0-1015.15~16.04.1
4.15.0-1017.18~16.04.1
4.15.0-1018.19~16.04.2
4.15.0-1019.20~16.04.1
4.15.0-1021.22~16.04.1
4.15.0-1023.24~16.04.1
4.15.0-1024.25~16.04.2
4.15.0-1025.26~16.04.1
4.15.0-1026.27~16.04.1
4.15.0-1027.28~16.04.1
4.15.0-1028.29~16.04.1
4.15.0-1029.31~16.04.1
4.15.0-1030.32~16.04.1
4.15.0-1032.34~16.04.1
4.15.0-1033.35~16.04.1
4.15.0-1034.36~16.04.1
4.15.0-1036.38~16.04.1
4.15.0-1037.39~16.04.1
4.15.0-1040.42~16.04.1
4.15.0-1041.43
4.15.0-1042.44
4.15.0-1044.46
4.15.0-1046.49
4.15.0-1047.50
4.15.0-1049.52
4.15.0-1050.53
4.15.0-1052.56
4.15.0-1055.59
4.15.0-1058.62
4.15.0-1060.64
4.15.0-1061.65
4.15.0-1071.81~16.04.1
4.15.0-1077.87~16.04.1
4.15.0-1078.88~16.04.1
4.15.0-1080.90~16.04.1
4.15.0-1081.92~16.04.1
4.15.0-1083.94~16.04.1
4.15.0-1084.95~16.04.1
4.15.0-1086.98~16.04.1
4.15.0-1087.100~16.04.1
4.15.0-1088.101~16.04.1
4.15.0-1090.103~16.04.1
4.15.0-1091.104~16.04.1
4.15.0-1092.105~16.04.1
4.15.0-1093.106~16.04.1
4.15.0-1094.107~16.04.1
4.15.0-1095.108~16.04.1
4.15.0-1096.109~16.04.1
4.15.0-1097.110~16.04.1
4.15.0-1098.111~16.04.1
4.15.0-1099.112~16.04.1
4.15.0-1100.113~16.04.1
4.15.0-1103.116~16.04.1
4.15.0-1106.120~16.04.1
4.15.0-1107.121~16.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "linux-buildinfo-4.15.0-1108-gcp": "4.15.0-1108.122~16.04.1",
            "linux-image-unsigned-4.15.0-1108-gcp-dbgsym": "4.15.0-1108.122~16.04.1",
            "linux-modules-extra-4.15.0-1108-gcp": "4.15.0-1108.122~16.04.1",
            "linux-gcp-headers-4.15.0-1108": "4.15.0-1108.122~16.04.1",
            "linux-gcp-tools-4.15.0-1108": "4.15.0-1108.122~16.04.1",
            "linux-headers-4.15.0-1108-gcp": "4.15.0-1108.122~16.04.1",
            "linux-tools-4.15.0-1108-gcp": "4.15.0-1108.122~16.04.1",
            "linux-modules-4.15.0-1108-gcp": "4.15.0-1108.122~16.04.1",
            "linux-image-unsigned-4.15.0-1108-gcp": "4.15.0-1108.122~16.04.1"
        }
    ]
}

Ubuntu:18.04:LTS / linux-gcp-4.15

Package

Name
linux-gcp-4.15
Purl
pkg:deb/ubuntu/linux-gcp-4.15@4.15.0-1108.122?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1108.122

Affected versions

4.*

4.15.0-1071.81
4.15.0-1077.87
4.15.0-1078.88
4.15.0-1080.90
4.15.0-1081.92
4.15.0-1083.94
4.15.0-1084.95
4.15.0-1086.98
4.15.0-1087.100
4.15.0-1088.101
4.15.0-1090.103
4.15.0-1091.104
4.15.0-1092.105
4.15.0-1093.106
4.15.0-1094.107
4.15.0-1095.108
4.15.0-1096.109
4.15.0-1097.110
4.15.0-1098.111
4.15.0-1099.112
4.15.0-1100.113
4.15.0-1103.116
4.15.0-1106.120
4.15.0-1107.121

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-buildinfo-4.15.0-1108-gcp": "4.15.0-1108.122",
            "linux-image-unsigned-4.15.0-1108-gcp-dbgsym": "4.15.0-1108.122",
            "linux-modules-extra-4.15.0-1108-gcp": "4.15.0-1108.122",
            "linux-gcp-4.15-tools-4.15.0-1108": "4.15.0-1108.122",
            "linux-gcp-4.15-headers-4.15.0-1108": "4.15.0-1108.122",
            "linux-headers-4.15.0-1108-gcp": "4.15.0-1108.122",
            "linux-tools-4.15.0-1108-gcp": "4.15.0-1108.122",
            "linux-modules-4.15.0-1108-gcp": "4.15.0-1108.122",
            "linux-image-unsigned-4.15.0-1108-gcp": "4.15.0-1108.122"
        }
    ]
}