Ubuntu update for linux



Published: 2022-10-03 | Updated: 2023-06-08
Risk Medium
Patch available YES
Number of vulnerabilities 14
CVE-ID CVE-2021-33655
CVE-2021-33656
CVE-2021-4037
CVE-2022-0850
CVE-2022-1199
CVE-2022-1204
CVE-2022-1729
CVE-2022-20368
CVE-2022-2639
CVE-2022-2964
CVE-2022-2978
CVE-2022-3028
CVE-2022-3202
CVE-2022-36946
CWE-ID CWE-787
CWE-284
CWE-200
CWE-476
CWE-416
CWE-362
CWE-125
CWE-191
CWE-20
Exploitation vector Network
Public exploit Public exploit code for vulnerability #9 is available.
Public exploit code for vulnerability #14 is available.
Vulnerable software
Subscribe
Ubuntu
Operating systems & Components / Operating system

linux-image-virtual-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-lowlatency-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-1113-aws (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic-lts-xenial (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-lowlatency (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-kvm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-1151-aws (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-1114-kvm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-234-generic (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-4.4.0-234-lowlatency (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-aws (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-virtual (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 14 vulnerabilities.

1) Out-of-bounds write

EUVDB-ID: #VU65833

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-33655

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in FBIOPUT_VSCREENINFO IOCTL. A local user can trigger an out-of-bounds write error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds write

EUVDB-ID: #VU66590

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-33656

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when setting font with malicous data by ioctl cmd PIO_FONT. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper access control

EUVDB-ID: #VU63923

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-4037

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the fs/inode.c:inode_init_owner() function logic of the Linux kernel. A local user can create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set to bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Information disclosure

EUVDB-ID: #VU63423

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0850

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in the copy_page_to_iter() function in iov_iter.c in Linux kernel. A local user can gain unauthorized access to sensitive information on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) NULL pointer dereference

EUVDB-ID: #VU63432

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1199

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a Null pointer dereference and use after free errors in the ax25_release() function. A local user can simulate Amateur Radio and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU63791

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1204

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in the Linux kernel’s Amateur Radio AX.25 protocol functionality when user connects with the protocol. A local user can trigger use-after-free error to perform a denial of service attack or escalate privileges on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Race condition

EUVDB-ID: #VU64156

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1729

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within sys_perf_event_open() in Linux kernel. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Out-of-bounds read

EUVDB-ID: #VU67473

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-20368

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary condition within the packet_recvmsg() function in Linux kernel. A local user can trigger an out-of-bounds read error and potentially escalate privileges on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Integer underflow

EUVDB-ID: #VU66812

Risk: Low

CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-2639

CWE-ID: CWE-191 - Integer underflow

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer underflow within the reserve_sfa_size() function in the openvswitch kernel module in Linux kernel. A local user can trigger an out-of-bounds read error and crash the system or escalate privileges.


Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

10) Out-of-bounds write

EUVDB-ID: #VU67811

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-2964

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices driver in Linux kernel. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU67812

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-2978

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the Linux kernel NILFS file system. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Race condition

EUVDB-ID: #VU67477

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3028

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. A local user can exploit the race and escalate privileges on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) NULL pointer dereference

EUVDB-ID: #VU67810

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3202

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in diFree in fs/jfs/inode.c in Journaled File System (JFS) in the Linux kernel. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Input validation error

EUVDB-ID: #VU66476

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-36946

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the nfqnl_mangle() function in net/netfilter/nfnetlink_queue.c in the Linux kernel when processing IPv6 packets. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240

linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240

linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240

linux-image-aws (Ubuntu package): before 4.4.0.234.240

linux-image-generic (Ubuntu package): before 4.4.0.234.240

linux-image-virtual (Ubuntu package): before 4.4.0.234.240

External links

http://ubuntu.com/security/notices/USN-5650-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###