vulnerability
Ubuntu: (Multiple Advisories) (CVE-2021-42327): Linux kernel (OEM) vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Oct 21, 2021 | Dec 1, 2021 | Mar 22, 2023 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Oct 21, 2021
Added
Dec 1, 2021
Modified
Mar 22, 2023
Description
dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
Solution(s)
ubuntu-upgrade-linux-image-5-11-0-1028-azureubuntu-upgrade-linux-image-5-11-0-1028-oracleubuntu-upgrade-linux-image-5-11-0-1029-gcpubuntu-upgrade-linux-image-5-13-0-1010-intelubuntu-upgrade-linux-image-5-13-0-1011-kvmubuntu-upgrade-linux-image-5-13-0-1012-awsubuntu-upgrade-linux-image-5-13-0-1013-gcpubuntu-upgrade-linux-image-5-13-0-1016-oracleubuntu-upgrade-linux-image-5-13-0-1016-raspiubuntu-upgrade-linux-image-5-13-0-1016-raspi-nolpaeubuntu-upgrade-linux-image-5-13-0-1029-oemubuntu-upgrade-linux-image-5-13-0-28-genericubuntu-upgrade-linux-image-5-13-0-28-generic-64kubuntu-upgrade-linux-image-5-13-0-28-generic-lpaeubuntu-upgrade-linux-image-5-13-0-28-lowlatencyubuntu-upgrade-linux-image-5-14-0-1008-oemubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-intelubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-20-04
References
- CVE-2021-42327
- https://attackerkb.com/topics/CVE-2021-42327
- NVD-CVE-2021-42327
- UBUNTU-USN-5165-1
- UBUNTU-USN-5217-1
- UBUNTU-USN-5240-1
- UBUNTU-USN-5265-1
- UBUNTU-USN-5278-1
- UBUNTU-USN-5294-1
- UBUNTU-USN-5294-2
- UBUNTU-USN-5295-1
- UBUNTU-USN-5295-2
- UBUNTU-USN-5297-1
- UBUNTU-USN-5298-1
- UBUNTU-USN-5302-1
- UBUNTU-USN-5317-1
- UBUNTU-USN-5318-1
- UBUNTU-USN-5319-1
- UBUNTU-USN-5337-1
- UBUNTU-USN-5338-1
- UBUNTU-USN-5339-1
- UBUNTU-USN-5343-1
- UBUNTU-USN-5346-1
- UBUNTU-USN-5361-1
- UBUNTU-USN-5362-1
- UBUNTU-USN-5368-1
- UBUNTU-USN-5377-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.