Ubuntu 18.04 LTS / 20.04 LTS : Linux kernel (Azure) regression (USN-5091-3)

info Nessus Plugin ID 154162

Synopsis

The remote Ubuntu host is missing a security update.

Description

The remote Ubuntu 18.04 LTS / 20.04 LTS host has a package installed that is affected by a vulnerability as referenced in the USN-5091-3 advisory.

USN-5091-1 fixed vulnerabilities in Linux 5.4-based kernels. Unfortunately, for Linux kernels intended for use within Microsoft Azure environments, that update introduced a regression that could cause the kernel to fail to boot in large Azure instance types. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Ofek Kirzner, Adam Morrison, Benedict Schlueter, and Piotr Krysiuk

discovered that the BPF verifier in the Linux kernel missed possible

mispredicted branches due to type confusion, allowing a side-channel

attack. An attacker could use this to expose sensitive information.

(CVE-2021-33624)

It was discovered that the tracing subsystem in the Linux kernel did not

properly keep track of per-cpu ring buffer state. A privileged attacker

could use this to cause a denial of service. (CVE-2021-3679)

Alexey Kardashevskiy discovered that the KVM implementation for PowerPC

systems in the Linux kernel did not properly validate RTAS arguments in

some situations. An attacker in a guest vm could use this to cause a denial

of service (host OS crash) or possibly execute arbitrary code.

(CVE-2021-37576)

It was discovered that the Virtio console implementation in the Linux

kernel did not properly validate input lengths in some situations. A local

attacker could possibly use this to cause a denial of service (system

crash). (CVE-2021-38160)

Michael Wakabayashi discovered that the NFSv4 client implementation in the

Linux kernel did not properly order connection setup operations. An

attacker controlling a remote NFS server could use this to cause a denial

of service on the client. (CVE-2021-38199)

It was discovered that the MAX-3421 host USB device driver in the Linux

kernel did not properly handle device removal events. A physically

proximate attacker could use this to cause a denial of service (system

crash). (CVE-2021-38204)

Tenable has extracted the preceding description block directly from the Ubuntu security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

https://ubuntu.com/security/notices/USN-5091-3

Plugin Details

Severity: Info

ID: 154162

File Name: ubuntu_USN-5091-3.nasl

Version: 1.8

Type: local

Agent: unix

Published: 10/15/2021

Updated: 8/27/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Vulnerability Information

CPE: cpe:/o:canonical:ubuntu_linux:18.04:-:lts, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4.0-1061-azure

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Exploit Ease: No known exploits are available

Patch Publication Date: 10/15/2021

Vulnerability Publication Date: 10/15/2021

Reference Information

USN: 5091-3