Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU62485
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-43975
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the hw_atl_utils_fw_rpc_wait() function in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c in Linux kernel. A local user can attach a specially crafted device to the system, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 18.04
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-oem (Ubuntu package): before 5.4.0.109.113
linux-image-virtual-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-virtual (Ubuntu package): before 4.15.0.176.165
linux-image-snapdragon (Ubuntu package): before 4.15.0.1126.129
linux-image-oracle-lts-18.04 (Ubuntu package): before 4.15.0.1092.102
linux-image-lowlatency-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-lowlatency (Ubuntu package): before 4.15.0.176.165
linux-image-kvm (Ubuntu package): before 4.15.0.1113.109
linux-image-generic-lpae (Ubuntu package): before 4.15.0.176.165
linux-image-generic-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-generic (Ubuntu package): before 4.15.0.176.165
linux-image-gcp-lts-18.04 (Ubuntu package): before 4.15.0.1121.140
linux-image-dell300x (Ubuntu package): before 4.15.0.1041.43
linux-image-azure-lts-18.04 (Ubuntu package): before 4.15.0.1137.110
linux-image-aws-lts-18.04 (Ubuntu package): before 4.15.0.1127.130
linux-image-4.15.0-176-lowlatency (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-176-generic-lpae (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-176-generic (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-1137-azure (Ubuntu package): before 4.15.0-1137.150
linux-image-4.15.0-1127-aws (Ubuntu package): before 4.15.0-1127.136
linux-image-4.15.0-1126-snapdragon (Ubuntu package): before 4.15.0-1126.135
linux-image-4.15.0-1121-gcp (Ubuntu package): before 4.15.0-1121.135
linux-image-4.15.0-1113-kvm (Ubuntu package): before 4.15.0-1113.116
linux-image-4.15.0-1092-oracle (Ubuntu package): before 4.15.0-1092.101
linux-image-4.15.0-1041-dell300x (Ubuntu package): before 4.15.0-1041.46
linux-image-aws-hwe (Ubuntu package): before 4.15.0.1099.92
Fixed software versionsCPE2.3 External links
http://ubuntu.com/security/notices/USN-5385-1
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU61210
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-0617
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the Linux kernel UDF file system functionality. A local user can supply a malicious UDF image to the udf_file_write_iter() function and perform a denial of service (DoS) attack.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 18.04
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-oem (Ubuntu package): before 5.4.0.109.113
linux-image-virtual-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-virtual (Ubuntu package): before 4.15.0.176.165
linux-image-snapdragon (Ubuntu package): before 4.15.0.1126.129
linux-image-oracle-lts-18.04 (Ubuntu package): before 4.15.0.1092.102
linux-image-lowlatency-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-lowlatency (Ubuntu package): before 4.15.0.176.165
linux-image-kvm (Ubuntu package): before 4.15.0.1113.109
linux-image-generic-lpae (Ubuntu package): before 4.15.0.176.165
linux-image-generic-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-generic (Ubuntu package): before 4.15.0.176.165
linux-image-gcp-lts-18.04 (Ubuntu package): before 4.15.0.1121.140
linux-image-dell300x (Ubuntu package): before 4.15.0.1041.43
linux-image-azure-lts-18.04 (Ubuntu package): before 4.15.0.1137.110
linux-image-aws-lts-18.04 (Ubuntu package): before 4.15.0.1127.130
linux-image-4.15.0-176-lowlatency (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-176-generic-lpae (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-176-generic (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-1137-azure (Ubuntu package): before 4.15.0-1137.150
linux-image-4.15.0-1127-aws (Ubuntu package): before 4.15.0-1127.136
linux-image-4.15.0-1126-snapdragon (Ubuntu package): before 4.15.0-1126.135
linux-image-4.15.0-1121-gcp (Ubuntu package): before 4.15.0-1121.135
linux-image-4.15.0-1113-kvm (Ubuntu package): before 4.15.0-1113.116
linux-image-4.15.0-1092-oracle (Ubuntu package): before 4.15.0-1092.101
linux-image-4.15.0-1041-dell300x (Ubuntu package): before 4.15.0-1041.46
linux-image-aws-hwe (Ubuntu package): before 4.15.0.1099.92
Fixed software versionsCPE2.3 External links
http://ubuntu.com/security/notices/USN-5385-1
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU61211
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-24448
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to missing initialization of resource within the fs/nfs/dir.c in the Linux kernel. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 18.04
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-oem (Ubuntu package): before 5.4.0.109.113
linux-image-virtual-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-virtual (Ubuntu package): before 4.15.0.176.165
linux-image-snapdragon (Ubuntu package): before 4.15.0.1126.129
linux-image-oracle-lts-18.04 (Ubuntu package): before 4.15.0.1092.102
linux-image-lowlatency-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-lowlatency (Ubuntu package): before 4.15.0.176.165
linux-image-kvm (Ubuntu package): before 4.15.0.1113.109
linux-image-generic-lpae (Ubuntu package): before 4.15.0.176.165
linux-image-generic-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-generic (Ubuntu package): before 4.15.0.176.165
linux-image-gcp-lts-18.04 (Ubuntu package): before 4.15.0.1121.140
linux-image-dell300x (Ubuntu package): before 4.15.0.1041.43
linux-image-azure-lts-18.04 (Ubuntu package): before 4.15.0.1137.110
linux-image-aws-lts-18.04 (Ubuntu package): before 4.15.0.1127.130
linux-image-4.15.0-176-lowlatency (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-176-generic-lpae (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-176-generic (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-1137-azure (Ubuntu package): before 4.15.0-1137.150
linux-image-4.15.0-1127-aws (Ubuntu package): before 4.15.0-1127.136
linux-image-4.15.0-1126-snapdragon (Ubuntu package): before 4.15.0-1126.135
linux-image-4.15.0-1121-gcp (Ubuntu package): before 4.15.0-1121.135
linux-image-4.15.0-1113-kvm (Ubuntu package): before 4.15.0-1113.116
linux-image-4.15.0-1092-oracle (Ubuntu package): before 4.15.0-1092.101
linux-image-4.15.0-1041-dell300x (Ubuntu package): before 4.15.0-1041.46
linux-image-aws-hwe (Ubuntu package): before 4.15.0.1099.92
Fixed software versionsCPE2.3 External links
http://ubuntu.com/security/notices/USN-5385-1
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU62482
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-24959
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the yam_siocdevprivate() function in drivers/net/hamradio/yam.c. A local user can perform a denial of service attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 18.04
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-oem (Ubuntu package): before 5.4.0.109.113
linux-image-virtual-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-virtual (Ubuntu package): before 4.15.0.176.165
linux-image-snapdragon (Ubuntu package): before 4.15.0.1126.129
linux-image-oracle-lts-18.04 (Ubuntu package): before 4.15.0.1092.102
linux-image-lowlatency-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-lowlatency (Ubuntu package): before 4.15.0.176.165
linux-image-kvm (Ubuntu package): before 4.15.0.1113.109
linux-image-generic-lpae (Ubuntu package): before 4.15.0.176.165
linux-image-generic-hwe-16.04 (Ubuntu package): before 4.15.0.176.165
linux-image-generic (Ubuntu package): before 4.15.0.176.165
linux-image-gcp-lts-18.04 (Ubuntu package): before 4.15.0.1121.140
linux-image-dell300x (Ubuntu package): before 4.15.0.1041.43
linux-image-azure-lts-18.04 (Ubuntu package): before 4.15.0.1137.110
linux-image-aws-lts-18.04 (Ubuntu package): before 4.15.0.1127.130
linux-image-4.15.0-176-lowlatency (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-176-generic-lpae (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-176-generic (Ubuntu package): before 4.15.0-176.185
linux-image-4.15.0-1137-azure (Ubuntu package): before 4.15.0-1137.150
linux-image-4.15.0-1127-aws (Ubuntu package): before 4.15.0-1127.136
linux-image-4.15.0-1126-snapdragon (Ubuntu package): before 4.15.0-1126.135
linux-image-4.15.0-1121-gcp (Ubuntu package): before 4.15.0-1121.135
linux-image-4.15.0-1113-kvm (Ubuntu package): before 4.15.0-1113.116
linux-image-4.15.0-1092-oracle (Ubuntu package): before 4.15.0-1092.101
linux-image-4.15.0-1041-dell300x (Ubuntu package): before 4.15.0-1041.46
linux-image-aws-hwe (Ubuntu package): before 4.15.0.1099.92
Fixed software versionsCPE2.3 External links
http://ubuntu.com/security/notices/USN-5385-1
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?