Log

AVG-1853 created at 21 Apr 2021 14:21:32
Packages
+ linux-zen
Issues
+ CVE-2021-23133
+ CVE-2021-29155
Status
+ Vulnerable
Severity
+ Medium
Affected
+ 5.11.15.zen1-2
Fixed
Ticket
Advisory qualified
+ Yes
References
Notes
AVG-1852 created at 21 Apr 2021 14:21:19
Packages
+ linux-hardened
Issues
+ CVE-2021-23133
+ CVE-2021-29155
Status
+ Vulnerable
Severity
+ Medium
Affected
+ 5.11.15.hardened1-1
Fixed
Ticket
Advisory qualified
+ Yes
References
Notes
AVG-1851 created at 21 Apr 2021 14:20:59
Packages
+ linux
Issues
+ CVE-2021-23133
+ CVE-2021-29155
Status
+ Vulnerable
Severity
+ Medium
Affected
+ 5.11.15.arch1-2
Fixed
Ticket
Advisory qualified
+ Yes
References
Notes
AVG-1785 edited at 21 Apr 2021 14:20:23
Issues
CVE-2021-3506
- CVE-2021-23133
- CVE-2021-29155
CVE-2021-30178
AVG-1784 edited at 21 Apr 2021 14:20:15
Issues
CVE-2021-3506
- CVE-2021-23133
- CVE-2021-29155
CVE-2021-30178
AVG-1783 edited at 21 Apr 2021 14:20:05
Issues
CVE-2021-3506
- CVE-2021-23133
- CVE-2021-29155
CVE-2021-30178
AVG-1741 edited at 21 Apr 2021 14:19:26
Issues
CVE-2021-3506
- CVE-2021-23133
- CVE-2021-29155
CVE-2021-29648
CVE-2021-30178
Affected
- 5.10.31-1
+ 5.10.32-1
CVE-2021-29155 edited at 21 Apr 2021 14:17:52
Description
- An issue has been discovered in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). Unprivileged BPF programs running on affected systems can bypass the protection and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract the contents of the kernel memory via a side-channel. The identified gap is that when protecting sequences of pointer arithmetic operations against speculatively out-of-bounds loads, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.
+ An issue has been discovered in the Linux kernel before version 5.11.16 in the mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). Unprivileged BPF programs running on affected systems can bypass the protection and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract the contents of the kernel memory via a side-channel. The identified gap is that when protecting sequences of pointer arithmetic operations against speculatively out-of-bounds loads, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.
References
https://www.openwall.com/lists/oss-security/2021/04/18/4
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9601148392520e2e134936e76788fc2a6371e7be
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6f55b2f2a1178856c19bbce2f71449926e731914
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24c109bb1537c12c02aeed2d51a347b4d6a9b76e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b658bbb844e28f1862867f37e8ca11a8e2aa94a3
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a6aaece00a57fa6f22575364b3903dfbccf5345d
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=073815b756c51ba9d8384d924c5d1c03ca3d1ae4
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f528819334881fd622fdadeddb3f7edaed8b7c9b
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fedb63a8307dda0ec3b8969a3b233a1dd7ea8e0
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.16&id=4ccdc6c6cae38b91c871293fb0ed8c6845a61b51
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.16&id=1611010fa388974b61cd6362c49d3fd1e31e2126
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.16&id=af2bb00759b8810ec652a57d73158baf5a7b3a59
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.16&id=4aa1f14c519b96c66b63fb16122d6c3a04680bc6
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.16&id=5cba7ca00dae28bec6e13684b7a0ec83c64cd72e
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.16&id=8a39972ed3cec42163abc71787d7fc11bf316c78
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.32&id=4f3ff11204eac0ee23acf64deecb3bad7b0db0c6
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.32&id=589fd9684dfafee37c60abde4ca3c0af723be3b3
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.32&id=480d875f12424a86fd710e8762ed1e23b7f02572
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.32&id=55565c30790839b40311c270a8b1a437ae9b2769
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.32&id=7723d3243857ab20f6450cfbbd765d8594e5e308
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.32&id=fbe6603e7cabad8a203a764300531e9ca811317a
CVE-2021-23133 edited at 21 Apr 2021 14:09:25
Description
- A race condition was found in the Linux kernel in sctp_destroy_sock. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock held and sp->do_auto_asconf is true, then an element is removed from the auto_asconf_splist without any proper locking. This can lead to kernel privilege escalation from the context of a network service or from an unprivileged process if certain conditions are met.
+ A race condition was found in the Linux kernel before version 5.11.16 in sctp_destroy_sock. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock held and sp->do_auto_asconf is true, then an element is removed from the auto_asconf_splist without any proper locking. This can lead to kernel privilege escalation from the context of a network service or from an unprivileged process if certain conditions are met.
References
https://www.openwall.com/lists/oss-security/2021/04/18/2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.16&id=59b5f3e478dbcb4c384cf0888d6cc9f5cad79f2f
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.32&id=5a627026be4a17e5b9db23558cd28e62b2cbc66e
CVE-2021-21640 edited at 21 Apr 2021 12:31:46
Remote
- Local
+ Remote
References
https://www.jenkins.io/security/advisory/2021-04-07/#SECURITY-1871
- https://nvd.nist.gov/vuln/detail/CVE-2021-21640
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21640
https://www.openwall.com/lists/oss-security/2021/04/07/2