{"id":"USN-4911-1","summary":"linux-oem-5.10 vulnerabilities","details":"It was discovered that the Nouveau GPU driver in the Linux kernel did not\nproperly handle error conditions in some situations. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2020-25639)\n\nJan Beulich discovered that the Xen netback backend in the Linux kernel did\nnot properly handle certain error conditions under paravirtualization. An\nattacker in a guest VM could possibly use this to cause a denial of service\n(host domain crash). (CVE-2021-28038)\n\nIt was discovered that the fastrpc driver in the Linux kernel did not\nprevent user space applications from sending kernel RPC messages. A local\nattacker could possibly use this to gain elevated privileges.\n(CVE-2021-28375)\n\nIt was discovered that the fuse user space file system implementation in\nthe Linux kernel did not properly handle bad inodes in some situations. A\nlocal attacker could possibly use this to cause a denial of service.\n(CVE-2021-28950)\n","modified":"2026-02-10T04:42:08Z","published":"2021-04-13T22:06:48Z","related":["UBUNTU-CVE-2020-25639","UBUNTU-CVE-2021-28038","UBUNTU-CVE-2021-28375","UBUNTU-CVE-2021-28950"],"upstream":["CVE-2020-25639","CVE-2021-28038","CVE-2021-28375","CVE-2021-28950","UBUNTU-CVE-2020-25639","UBUNTU-CVE-2021-28038","UBUNTU-CVE-2021-28375","UBUNTU-CVE-2021-28950"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4911-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25639"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28038"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28375"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28950"}],"affected":[{"package":{"name":"linux-oem-5.10","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-oem-5.10@5.10.0-1021.22?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.0-1021.22"}]}],"versions":["5.10.0-1008.9","5.10.0-1011.12","5.10.0-1013.14","5.10.0-1014.15","5.10.0-1016.17","5.10.0-1017.18","5.10.0-1019.20"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.10.0-1021.22","binary_name":"linux-buildinfo-5.10.0-1021-oem"},{"binary_version":"5.10.0-1021.22","binary_name":"linux-headers-5.10.0-1021-oem"},{"binary_version":"5.10.0-1021.22","binary_name":"linux-image-unsigned-5.10.0-1021-oem"},{"binary_version":"5.10.0-1021.22","binary_name":"linux-modules-5.10.0-1021-oem"},{"binary_version":"5.10.0-1021.22","binary_name":"linux-oem-5.10-headers-5.10.0-1021"},{"binary_version":"5.10.0-1021.22","binary_name":"linux-oem-5.10-tools-5.10.0-1021"},{"binary_version":"5.10.0-1021.22","binary_name":"linux-oem-5.10-tools-host"},{"binary_version":"5.10.0-1021.22","binary_name":"linux-tools-5.10.0-1021-oem"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-25639"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-28038"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-28375"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-28950"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4911-1.json"}}],"schema_version":"1.7.3"}