7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
AI Score
Confidence
Low
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
31.3%
The remote host is missing an update for the
# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.845146");
script_cve_id("CVE-2021-3655", "CVE-2021-3744", "CVE-2021-3764", "CVE-2021-42252");
script_tag(name:"creation_date", value:"2021-12-01 02:00:47 +0000 (Wed, 01 Dec 2021)");
script_version("2024-02-02T05:06:08+0000");
script_tag(name:"last_modification", value:"2024-02-02 05:06:08 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"4.6");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2021-10-19 01:59:04 +0000 (Tue, 19 Oct 2021)");
script_name("Ubuntu: Security Advisory (USN-5161-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2021 Greenbone AG");
script_family("Ubuntu Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU(20\.04\ LTS|21\.04)");
script_xref(name:"Advisory-ID", value:"USN-5161-1");
script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-5161-1");
script_tag(name:"summary", value:"The remote host is missing an update for the 'linux, linux-aws, linux-aws-5.11, linux-azure, linux-azure-5.11, linux-gcp, linux-gcp-5.11, linux-hwe-5.11, linux-kvm, linux-oracle, linux-oracle-5.11, linux-raspi' package(s) announced via the USN-5161-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Ilja Van Sprundel discovered that the SCTP implementation in the Linux
kernel did not properly perform size validations on incoming packets in
some situations. An attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2021-3655)
It was discovered that the AMD Cryptographic Coprocessor (CCP) driver in
the Linux kernel did not properly deallocate memory in some error
conditions. A local attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2021-3744, CVE-2021-3764)
It was discovered that the Aspeed Low Pin Count (LPC) Bus Controller
implementation in the Linux kernel did not properly perform boundary checks
in some situations, allowing out-of-bounds write access. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. In Ubuntu, this issue only affected systems running
armhf kernels. (CVE-2021-42252)");
script_tag(name:"affected", value:"'linux, linux-aws, linux-aws-5.11, linux-azure, linux-azure-5.11, linux-gcp, linux-gcp-5.11, linux-hwe-5.11, linux-kvm, linux-oracle, linux-oracle-5.11, linux-raspi' package(s) on Ubuntu 20.04, Ubuntu 21.04.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "UBUNTU20.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1022-aws", ver:"5.11.0-1022.23~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1022-azure", ver:"5.11.0-1022.23~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1022-oracle", ver:"5.11.0-1022.23~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1023-gcp", ver:"5.11.0-1023.25~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-41-generic", ver:"5.11.0-41.45~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-41-generic-64k", ver:"5.11.0-41.45~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-41-generic-lpae", ver:"5.11.0-41.45~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-41-lowlatency", ver:"5.11.0-41.45~20.04.1", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-aws", ver:"5.11.0.1022.23~20.04.21", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-azure", ver:"5.11.0.1022.23~20.04.22", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-gcp", ver:"5.11.0.1023.25~20.04.22", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic-64k-hwe-20.04", ver:"5.11.0.41.45~20.04.19", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic-hwe-20.04", ver:"5.11.0.41.45~20.04.19", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic-lpae-hwe-20.04", ver:"5.11.0.41.45~20.04.19", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency-hwe-20.04", ver:"5.11.0.41.45~20.04.19", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-oracle", ver:"5.11.0.1022.23~20.04.15", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-virtual-hwe-20.04", ver:"5.11.0.41.45~20.04.19", rls:"UBUNTU20.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU21.04") {
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1020-kvm", ver:"5.11.0-1020.22", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1022-aws", ver:"5.11.0-1022.23", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1022-azure", ver:"5.11.0-1022.23", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1022-oracle", ver:"5.11.0-1022.23", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1023-gcp", ver:"5.11.0-1023.25", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1023-raspi", ver:"5.11.0-1023.25", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-1023-raspi-nolpae", ver:"5.11.0-1023.25", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-41-generic", ver:"5.11.0-41.45", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-41-generic-64k", ver:"5.11.0-41.45", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-41-generic-lpae", ver:"5.11.0-41.45", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-5.11.0-41-lowlatency", ver:"5.11.0-41.45", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-aws", ver:"5.11.0.1022.23", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-azure", ver:"5.11.0.1022.23", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-gcp", ver:"5.11.0.1023.23", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic", ver:"5.11.0.41.42", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic-64k", ver:"5.11.0.41.42", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-generic-lpae", ver:"5.11.0.41.42", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-gke", ver:"5.11.0.1023.23", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-kvm", ver:"5.11.0.1020.21", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-lowlatency", ver:"5.11.0.41.42", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-oem-20.04", ver:"5.11.0.41.42", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-oracle", ver:"5.11.0.1022.23", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-raspi", ver:"5.11.0.1023.21", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-raspi-nolpae", ver:"5.11.0.1023.21", rls:"UBUNTU21.04"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"linux-image-virtual", ver:"5.11.0.41.42", rls:"UBUNTU21.04"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
AI Score
Confidence
Low
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
31.3%