[LSN-0086-1] Linux kernel vulnerability

benjamin.romer at canonical.com benjamin.romer at canonical.com
Thu Jun 2 13:41:03 UTC 2022


Linux kernel vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

-   Ubuntu 20.04 LTS
-   Ubuntu 18.04 LTS
-   Ubuntu 16.04 ESM
-   Ubuntu 22.04 LTS
-   Ubuntu 14.04 ESM

Summary

Several security issues were fixed in the kernel.

Software Description

-   linux - Linux kernel
-   linux-aws - Linux kernel for Amazon Web Services (AWS) systems
-   linux-azure - Linux kernel for Microsoft Azure Cloud systems
-   linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
-   linux-gke - Linux kernel for Google Container Engine (GKE) systems
-   linux-gkeop - Linux kernel for Google Container Engine (GKE) systems
-   linux-ibm - Linux kernel for IBM cloud systems
-   linux-oem - Linux kernel for OEM systems

Details

It was discovered that a race condition existed in the network
scheduling subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.
(CVE-2021-39713)

Yiqi Sun and Kevin Wang discovered that the cgroups implementation in
the Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges. (CVE-2022-0492)

It was discovered that the network traffic control implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1055)

Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the
Linux kernel contained in integer overflow. A local attacker could use
this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-1116)

It was discovered that the Linux kernel did not properly restrict access
to the kernel debugger when booted in secure boot environments. A
privileged attacker could use this to bypass UEFI Secure Boot
restrictions. (CVE-2022-21499)

Kyle Zeng discovered that the Network Queuing and Scheduling subsystem
of the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce
seccomp restrictions in some situations. A local attacker could use this
to bypass intended seccomp sandbox restrictions. (CVE-2022-30594)

Update instructions

The problem can be corrected by updating your kernel livepatch to the
following versions:

Ubuntu 20.04 LTS
    aws - 86.3
    azure - 86.3
    gcp - 86.3
    generic - 86.3
    gke - 86.3
    gkeop - 86.3
    ibm - 86.3
    lowlatency - 86.3

Ubuntu 18.04 LTS
    aws - 86.3
    azure - 86.3
    gcp - 86.3
    generic - 86.3
    gke - 86.3
    gkeop - 86.3
    ibm - 86.3
    lowlatency - 86.3
    oem - 86.3

Ubuntu 16.04 ESM
    aws - 86.3
    azure - 86.3
    gcp - 86.3
    generic - 86.3
    lowlatency - 86.3

Ubuntu 22.04 LTS
    gcp - 86.4
    generic - 86.4
    gke - 86.4
    ibm - 86.4
    lowlatency - 86.4

Ubuntu 14.04 ESM
    generic - 86.3
    lowlatency - 86.3

Support Information

Kernels older than the levels listed below do not receive livepatch
updates. If you are running a kernel version earlier than the one listed
below, please upgrade your kernel as soon as possible.

Ubuntu 20.04 LTS
    linux-aws - 5.4.0-1009
    linux-aws - 5.4.0-1061
    linux-azure - 5.4.0-1010
    linux-gcp - 5.4.0-1009
    linux-gke - 5.4.0-1033
    linux-gkeop - 5.4.0-1009
    linux-hwe - 5.15.0-0
    linux-ibm - 5.4.0-1009
    linux-oem - 5.4.0-26
    linux - 5.4.0-26

Ubuntu 18.04 LTS
    linux-aws-5.4 - 5.4.0-1069
    linux-aws - 4.15.0-1054
    linux-azure-4.15 - 4.15.0-1115
    linux-azure-5.4 - 5.4.0-1069
    linux-gcp-4.15 - 4.15.0-1121
    linux-gcp-5.4 - 5.4.0-1069
    linux-gke-4.15 - 4.15.0-1076
    linux-gke-5.4 - 5.4.0-1009
    linux-gkeop-5.4 - 5.4.0-1007
    linux-hwe-5.4 - 5.4.0-26
    linux-ibm-5.4 - 5.4.0-1009
    linux-oem - 4.15.0-1063
    linux - 4.15.0-69

Ubuntu 16.04 ESM
    linux-aws-hwe - 4.15.0-1126
    linux-aws - 4.4.0-1098
    linux-aws - 4.4.0-1129
    linux-azure - 4.15.0-1063
    linux-azure - 4.15.0-1078
    linux-azure - 4.15.0-1114
    linux-gcp - 4.15.0-1118
    linux-hwe - 4.15.0-143
    linux-hwe - 4.15.0-69
    linux - 4.4.0-168
    linux - 4.4.0-211

Ubuntu 22.04 LTS
    linux-aws - 5.15.0-1000
    linux-azure - 5.15.0-1000
    linux-gcp - 5.15.0-1000
    linux-gke - 5.15.0-1000
    linux-ibm - 5.15.0-1000
    linux - 5.15.0-24
    linux - 5.15.0-25

Ubuntu 14.04 ESM
    linux-lts-xenial - 4.4.0-168

References

-   CVE-2021-39713
-   CVE-2022-0492
-   CVE-2022-1055
-   CVE-2022-1116
-   CVE-2022-21499
-   CVE-2022-29581
-   CVE-2022-30594




More information about the ubuntu-security-announce mailing list