{"id":"USN-4945-2","summary":"linux-raspi, linux-raspi-5.4 vulnerabilities","details":"\nUSN-4945-1 fixed vulnerabilities in the Linux kernel for Ubuntu\n20.04 LTS and Ubuntu 18.04 LTS. This update provides the corresponding\nLinux kernel updates targeted specifically for Raspberry Pi devices\nin those same Ubuntu Releases.\n\nOriginal advisory details:\n\nIt was discovered that the Nouveau GPU driver in the Linux kernel did not\nproperly handle error conditions in some situations. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2020-25639)\n\nJan Beulich discovered that the Xen netback backend in the Linux kernel did\nnot properly handle certain error conditions under paravirtualization. An\nattacker in a guest VM could possibly use this to cause a denial of service\n(host domain crash). (CVE-2021-28038)\n\nIt was discovered that the fastrpc driver in the Linux kernel did not\nprevent user space applications from sending kernel RPC messages. A local\nattacker could possibly use this to gain elevated privileges.\n(CVE-2021-28375)\n\nIt was discovered that the Realtek RTL8188EU Wireless device driver in the\nLinux kernel did not properly validate ssid lengths in some situations. An\nattacker could use this to cause a denial of service (system crash).\n(CVE-2021-28660)\n\nIt was discovered that the USB/IP driver in the Linux kernel contained race\nconditions during the update of local and shared status. An attacker could\nuse this to cause a denial of service (system crash). (CVE-2021-29265)\n\nIt was discovered that a race condition existed in the netfilter subsystem\nof the Linux kernel when replacing tables. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2021-29650)\n\nArnd Bergmann discovered that the video4linux subsystem in the Linux kernel\ndid not properly deallocate memory in some situations. A local attacker\ncould use this to cause a denial of service (memory exhaustion).\n(CVE-2021-30002)\n","modified":"2026-02-10T04:42:10Z","published":"2021-05-19T05:48:06Z","related":["UBUNTU-CVE-2020-25639","UBUNTU-CVE-2021-28038","UBUNTU-CVE-2021-28375","UBUNTU-CVE-2021-28660","UBUNTU-CVE-2021-29265","UBUNTU-CVE-2021-29650","UBUNTU-CVE-2021-30002"],"upstream":["CVE-2020-25639","CVE-2021-28038","CVE-2021-28375","CVE-2021-28660","CVE-2021-29265","CVE-2021-29650","CVE-2021-30002","UBUNTU-CVE-2020-25639","UBUNTU-CVE-2021-28038","UBUNTU-CVE-2021-28375","UBUNTU-CVE-2021-28660","UBUNTU-CVE-2021-29265","UBUNTU-CVE-2021-29650","UBUNTU-CVE-2021-30002"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4945-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25639"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28038"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28375"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28660"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29265"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29650"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-30002"}],"affected":[{"package":{"name":"linux-raspi-5.4","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi-5.4@5.4.0-1035.38~18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1035.38~18.04.1"}]}],"versions":["5.4.0-1013.13~18.04.1","5.4.0-1015.15~18.04.1","5.4.0-1016.17~18.04.1","5.4.0-1018.20~18.04.1","5.4.0-1019.21~18.04.1","5.4.0-1021.24~18.04.1","5.4.0-1022.25~18.04.1","5.4.0-1023.26~18.04.1","5.4.0-1025.28~18.04.1","5.4.0-1026.29~18.04.1","5.4.0-1028.31~18.04.1","5.4.0-1029.32~18.04.1","5.4.0-1030.33~18.04.1","5.4.0-1032.35~18.04.1","5.4.0-1033.36~18.04.1","5.4.0-1034.37~18.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38~18.04.1"},{"binary_name":"linux-headers-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38~18.04.1"},{"binary_name":"linux-image-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38~18.04.1"},{"binary_name":"linux-modules-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38~18.04.1"},{"binary_name":"linux-raspi-5.4-headers-5.4.0-1035","binary_version":"5.4.0-1035.38~18.04.1"},{"binary_name":"linux-raspi-5.4-tools-5.4.0-1035","binary_version":"5.4.0-1035.38~18.04.1"},{"binary_name":"linux-tools-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38~18.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4945-2.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"id":"CVE-2020-25639","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-28038","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28375","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28660","severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-29265","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-29650","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-30002","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"linux-raspi","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi@5.4.0-1035.38?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1035.38"}]}],"versions":["5.4.0-1007.7","5.4.0-1008.8","5.4.0-1011.11","5.4.0-1012.12","5.4.0-1013.13","5.4.0-1015.15","5.4.0-1016.17","5.4.0-1018.20","5.4.0-1019.21","5.4.0-1021.24","5.4.0-1022.25","5.4.0-1023.26","5.4.0-1025.28","5.4.0-1026.29","5.4.0-1028.31","5.4.0-1029.32","5.4.0-1030.33","5.4.0-1032.35","5.4.0-1033.36","5.4.0-1034.37"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38"},{"binary_name":"linux-headers-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38"},{"binary_name":"linux-image-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38"},{"binary_name":"linux-modules-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38"},{"binary_name":"linux-raspi-headers-5.4.0-1035","binary_version":"5.4.0-1035.38"},{"binary_name":"linux-raspi-tools-5.4.0-1035","binary_version":"5.4.0-1035.38"},{"binary_name":"linux-tools-5.4.0-1035-raspi","binary_version":"5.4.0-1035.38"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4945-2.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2020-25639","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-28038","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28375","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28660","severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-29265","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-29650","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-30002","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}