{"id":"USN-5073-2","summary":"linux-gcp, linux-gcp-4.15 vulnerabilities","details":"Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor\nimplementation for AMD processors in the Linux kernel allowed a guest VM to\ndisable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a\nguest VM could use this to read or write portions of the host's physical\nmemory. (CVE-2021-3656)\n\nMaxim Levitsky discovered that the KVM hypervisor implementation for AMD\nprocessors in the Linux kernel did not properly prevent a guest VM from\nenabling AVIC in nested guest VMs. An attacker in a guest VM could use this\nto write to portions of the host's physical memory. (CVE-2021-3653)\n\nNorbert Slusarek discovered that the CAN broadcast manger (bcm) protocol\nimplementation in the Linux kernel did not properly initialize memory in\nsome situations. A local attacker could use this to expose sensitive\ninformation (kernel memory). (CVE-2021-34693)\n\nMurray McAllister discovered that the joystick device interface in the\nLinux kernel did not properly validate data passed via an ioctl(). A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code on systems with a joystick device\nregistered. (CVE-2021-3612)\n\nIt was discovered that the Virtio console implementation in the Linux\nkernel did not properly validate input lengths in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2021-38160)\n","modified":"2026-02-10T04:42:19Z","published":"2021-09-17T06:27:26Z","related":["UBUNTU-CVE-2021-34693","UBUNTU-CVE-2021-3612","UBUNTU-CVE-2021-3653","UBUNTU-CVE-2021-3656","UBUNTU-CVE-2021-38160"],"upstream":["CVE-2021-34693","CVE-2021-3612","CVE-2021-3653","CVE-2021-3656","CVE-2021-38160","UBUNTU-CVE-2021-34693","UBUNTU-CVE-2021-3612","UBUNTU-CVE-2021-3653","UBUNTU-CVE-2021-3656","UBUNTU-CVE-2021-38160"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5073-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3612"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3653"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3656"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-34693"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-38160"}],"affected":[{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@4.15.0-1108.122~16.04.1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1108.122~16.04.1"}]}],"versions":["4.10.0-1004.4","4.10.0-1006.6","4.10.0-1007.7","4.10.0-1008.8","4.10.0-1009.9","4.13.0-1002.5","4.13.0-1006.9","4.13.0-1007.10","4.13.0-1008.11","4.13.0-1011.15","4.13.0-1012.16","4.13.0-1013.17","4.13.0-1015.19","4.13.0-1017.21","4.13.0-1019.23","4.15.0-1014.14~16.04.1","4.15.0-1015.15~16.04.1","4.15.0-1017.18~16.04.1","4.15.0-1018.19~16.04.2","4.15.0-1019.20~16.04.1","4.15.0-1021.22~16.04.1","4.15.0-1023.24~16.04.1","4.15.0-1024.25~16.04.2","4.15.0-1025.26~16.04.1","4.15.0-1026.27~16.04.1","4.15.0-1027.28~16.04.1","4.15.0-1028.29~16.04.1","4.15.0-1029.31~16.04.1","4.15.0-1030.32~16.04.1","4.15.0-1032.34~16.04.1","4.15.0-1033.35~16.04.1","4.15.0-1034.36~16.04.1","4.15.0-1036.38~16.04.1","4.15.0-1037.39~16.04.1","4.15.0-1040.42~16.04.1","4.15.0-1041.43","4.15.0-1042.44","4.15.0-1044.46","4.15.0-1046.49","4.15.0-1047.50","4.15.0-1049.52","4.15.0-1050.53","4.15.0-1052.56","4.15.0-1055.59","4.15.0-1058.62","4.15.0-1060.64","4.15.0-1061.65","4.15.0-1071.81~16.04.1","4.15.0-1077.87~16.04.1","4.15.0-1078.88~16.04.1","4.15.0-1080.90~16.04.1","4.15.0-1081.92~16.04.1","4.15.0-1083.94~16.04.1","4.15.0-1084.95~16.04.1","4.15.0-1086.98~16.04.1","4.15.0-1087.100~16.04.1","4.15.0-1088.101~16.04.1","4.15.0-1090.103~16.04.1","4.15.0-1091.104~16.04.1","4.15.0-1092.105~16.04.1","4.15.0-1093.106~16.04.1","4.15.0-1094.107~16.04.1","4.15.0-1095.108~16.04.1","4.15.0-1096.109~16.04.1","4.15.0-1097.110~16.04.1","4.15.0-1098.111~16.04.1","4.15.0-1099.112~16.04.1","4.15.0-1100.113~16.04.1","4.15.0-1103.116~16.04.1","4.15.0-1106.120~16.04.1","4.15.0-1107.121~16.04.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"linux-buildinfo-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122~16.04.1"},{"binary_name":"linux-gcp-headers-4.15.0-1108","binary_version":"4.15.0-1108.122~16.04.1"},{"binary_name":"linux-gcp-tools-4.15.0-1108","binary_version":"4.15.0-1108.122~16.04.1"},{"binary_name":"linux-headers-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122~16.04.1"},{"binary_name":"linux-image-unsigned-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122~16.04.1"},{"binary_name":"linux-modules-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122~16.04.1"},{"binary_name":"linux-modules-extra-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122~16.04.1"},{"binary_name":"linux-tools-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122~16.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5073-2.json","cves_map":{"cves":[{"id":"CVE-2021-3612","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-3653","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2021-3656","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2021-34693","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-38160","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"linux-gcp-4.15","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-4.15@4.15.0-1108.122?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1108.122"}]}],"versions":["4.15.0-1071.81","4.15.0-1077.87","4.15.0-1078.88","4.15.0-1080.90","4.15.0-1081.92","4.15.0-1083.94","4.15.0-1084.95","4.15.0-1086.98","4.15.0-1087.100","4.15.0-1088.101","4.15.0-1090.103","4.15.0-1091.104","4.15.0-1092.105","4.15.0-1093.106","4.15.0-1094.107","4.15.0-1095.108","4.15.0-1096.109","4.15.0-1097.110","4.15.0-1098.111","4.15.0-1099.112","4.15.0-1100.113","4.15.0-1103.116","4.15.0-1106.120","4.15.0-1107.121"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122"},{"binary_name":"linux-gcp-4.15-headers-4.15.0-1108","binary_version":"4.15.0-1108.122"},{"binary_name":"linux-gcp-4.15-tools-4.15.0-1108","binary_version":"4.15.0-1108.122"},{"binary_name":"linux-headers-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122"},{"binary_name":"linux-image-unsigned-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122"},{"binary_name":"linux-modules-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122"},{"binary_name":"linux-modules-extra-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122"},{"binary_name":"linux-tools-4.15.0-1108-gcp","binary_version":"4.15.0-1108.122"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5073-2.json","cves_map":{"cves":[{"id":"CVE-2021-3612","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-3653","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2021-3656","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2021-34693","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-38160","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}