|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu: Security Advisory for linux (USN-5003-1)|
|Summary:||The remote host is missing an update for the 'linux'; package(s) announced via the USN-5003-1 advisory.|
The remote host is missing an update for the 'linux'
package(s) announced via the USN-5003-1 advisory.
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
It was discovered that the eBPF implementation in the Linux kernel did not
properly track bounds information for 32 bit registers when performing div
and mod operations. A local attacker could use this to possibly execute
arbitrary code. (CVE-2021-3600)
Or Cohen discovered that the SCTP implementation in the Linux kernel
contained a race condition in some situations, leading to a use-after-free
condition. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-23133)
'linux' package(s) on Ubuntu 18.04 LTS.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2021-3609|
Common Vulnerability Exposure (CVE) ID: CVE-2021-3600
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.