vulnerability

Ubuntu: USN-5086-1: Linux kernel vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Sep 22, 2021
Added
Sep 23, 2021
Modified
Feb 19, 2025

Description


Johan Almbladh discovered that the eBPF JIT implementation for IBM s390x systems in the Linux kernel miscompiled operations in some situations, allowing circumvention of the BPF verifier. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.

Solutions

ubuntu-upgrade-linux-image-4-15-0-158-genericubuntu-upgrade-linux-image-4-15-0-158-generic-lpaeubuntu-upgrade-linux-image-4-15-0-158-lowlatencyubuntu-upgrade-linux-image-4-4-0-216-genericubuntu-upgrade-linux-image-4-4-0-216-lowlatencyubuntu-upgrade-linux-image-5-11-0-36-genericubuntu-upgrade-linux-image-5-11-0-36-generic-64kubuntu-upgrade-linux-image-5-11-0-36-generic-lpaeubuntu-upgrade-linux-image-5-11-0-36-lowlatencyubuntu-upgrade-linux-image-5-4-0-86-genericubuntu-upgrade-linux-image-5-4-0-86-generic-lpaeubuntu-upgrade-linux-image-5-4-0-86-lowlatencyubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.