{"id":"USN-5162-1","summary":"linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem-5.13, linux-oracle, linux-raspi vulnerabilities","details":"Ilja Van Sprundel discovered that the SCTP implementation in the Linux\nkernel did not properly perform size validations on incoming packets in\nsome situations. An attacker could possibly use this to expose sensitive\ninformation (kernel memory). (CVE-2021-3655)\n\nIt was discovered that the AMD Cryptographic Coprocessor (CCP) driver in\nthe Linux kernel did not properly deallocate memory in some error\nconditions. A local attacker could use this to cause a denial of service\n(memory exhaustion). (CVE-2021-3744, CVE-2021-3764)\n\nIt was discovered that the Aspeed Low Pin Count (LPC) Bus Controller\nimplementation in the Linux kernel did not properly perform boundary checks\nin some situations, allowing out-of-bounds write access. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. In Ubuntu, this issue only affected systems running\narmhf kernels. (CVE-2021-42252)\n\nJann Horn discovered that the SELinux subsystem in the Linux kernel did not\nproperly handle subjective credentials for tasks in some situations. On\nsystems where SELinux has been enabled, a local attacker could possibly use\nthis to cause a denial of service (system crash) or execute arbitrary code.\n(CVE-2021-43057)\n","modified":"2026-02-10T04:42:23Z","published":"2021-11-30T22:22:53Z","related":["UBUNTU-CVE-2021-3655","UBUNTU-CVE-2021-3744","UBUNTU-CVE-2021-3764","UBUNTU-CVE-2021-42252","UBUNTU-CVE-2021-43057"],"upstream":["CVE-2021-3655","CVE-2021-3744","CVE-2021-3764","CVE-2021-42252","CVE-2021-43057","UBUNTU-CVE-2021-3655","UBUNTU-CVE-2021-3744","UBUNTU-CVE-2021-3764","UBUNTU-CVE-2021-42252","UBUNTU-CVE-2021-43057"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5162-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3655"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3744"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3764"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-42252"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-43057"}],"affected":[{"package":{"name":"linux-oem-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-oem-5.13@5.13.0-1020.24?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1020.24"}]}],"versions":["5.13.0-1009.10","5.13.0-1010.11","5.13.0-1012.16","5.13.0-1014.18","5.13.0-1017.21","5.13.0-1019.23"],"ecosystem_specific":{"binaries":[{"binary_version":"5.13.0-1020.24","binary_name":"linux-buildinfo-5.13.0-1020-oem"},{"binary_version":"5.13.0-1020.24","binary_name":"linux-headers-5.13.0-1020-oem"},{"binary_version":"5.13.0-1020.24","binary_name":"linux-image-unsigned-5.13.0-1020-oem"},{"binary_version":"5.13.0-1020.24","binary_name":"linux-modules-5.13.0-1020-oem"},{"binary_version":"5.13.0-1020.24","binary_name":"linux-oem-5.13-headers-5.13.0-1020"},{"binary_version":"5.13.0-1020.24","binary_name":"linux-oem-5.13-tools-5.13.0-1020"},{"binary_version":"5.13.0-1020.24","binary_name":"linux-oem-5.13-tools-host"},{"binary_version":"5.13.0-1020.24","binary_name":"linux-tools-5.13.0-1020-oem"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3655"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-3744"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-3764"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-43057"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5162-1.json"}}],"schema_version":"1.7.3"}