USN-5339-1: Linux kernel vulnerabilities
22 March 2022
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems
- linux-azure-4.15 - Linux kernel for Microsoft Azure Cloud systems
- linux-dell300x - Linux kernel for Dell 300x platforms
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe - Linux hardware enablement (HWE) kernel
- linux-kvm - Linux kernel for cloud environments
- linux-oracle - Linux kernel for Oracle Cloud systems
- linux-raspi2 - Linux kernel for Raspberry Pi systems
- linux-snapdragon - Linux kernel for Qualcomm Snapdragon processors
Details
Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges. (CVE-2022-0492)
It was discovered that an out-of-bounds (OOB) memory access flaw existed in
the f2fs module of the Linux kernel. A local attacker could use this issue
to cause a denial of service (system crash). (CVE-2021-3506)
Brendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver
in the Linux kernel did not properly handle some error conditions. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2021-43976)
It was discovered that the ARM Trusted Execution Environment (TEE)
subsystem in the Linux kernel contained a race condition leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service or possibly execute arbitrary code. (CVE-2021-44733)
It was discovered that the Phone Network protocol (PhoNet) implementation
in the Linux kernel did not properly perform reference counting in some
error conditions. A local attacker could possibly use this to cause a
denial of service (memory exhaustion). (CVE-2021-45095)
Samuel Page discovered that the Transparent Inter-Process Communication
(TIPC) protocol implementation in the Linux kernel contained a stack-based
buffer overflow. A remote attacker could use this to cause a denial of
service (system crash) for systems that have a TIPC bearer configured.
(CVE-2022-0435)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
linux-image-4.15.0-1110-kvm
-
4.15.0-1110.113
-
linux-image-aws-lts-18.04
-
4.15.0.1124.127
-
linux-image-generic
-
4.15.0.173.162
-
linux-image-4.15.0-1123-snapdragon
-
4.15.0-1123.132
-
linux-image-4.15.0-1119-gcp
-
4.15.0-1119.133
-
linux-image-oracle-lts-18.04
-
4.15.0.1090.100
-
linux-image-4.15.0-1134-azure
-
4.15.0-1134.147
-
linux-image-4.15.0-1090-oracle
-
4.15.0-1090.99
-
linux-image-virtual
-
4.15.0.173.162
-
linux-image-4.15.0-173-generic
-
4.15.0-173.182
-
linux-image-snapdragon
-
4.15.0.1123.126
-
linux-image-dell300x
-
4.15.0.1038.40
-
linux-image-4.15.0-1124-aws
-
4.15.0-1124.133
-
linux-image-4.15.0-1106-raspi2
-
4.15.0-1106.113
-
linux-image-4.15.0-1038-dell300x
-
4.15.0-1038.43
-
linux-image-raspi2
-
4.15.0.1106.104
-
linux-image-azure-lts-18.04
-
4.15.0.1134.107
-
linux-image-4.15.0-173-lowlatency
-
4.15.0-173.182
-
linux-image-gcp-lts-18.04
-
4.15.0.1119.138
-
linux-image-kvm
-
4.15.0.1110.106
-
linux-image-4.15.0-173-generic-lpae
-
4.15.0-173.182
-
linux-image-generic-lpae
-
4.15.0.173.162
-
linux-image-lowlatency
-
4.15.0.173.162
Ubuntu 16.04
-
linux-image-lowlatency-hwe-16.04
-
4.15.0.173.165
Available with Ubuntu Pro
-
linux-image-4.15.0-1124-aws-hwe
-
4.15.0-1124.133~16.04.1
Available with Ubuntu Pro
-
linux-image-4.15.0-173-generic
-
4.15.0-173.182~16.04.1
Available with Ubuntu Pro
-
linux-image-oem
-
4.15.0.173.165
Available with Ubuntu Pro
-
linux-image-4.15.0-1119-gcp
-
4.15.0-1119.133~16.04.1
Available with Ubuntu Pro
-
linux-image-4.15.0-1134-azure
-
4.15.0-1134.147~16.04.1
Available with Ubuntu Pro
-
linux-image-4.15.0-1090-oracle
-
4.15.0-1090.99~16.04.1
Available with Ubuntu Pro
-
linux-image-azure
-
4.15.0.1134.125
Available with Ubuntu Pro
-
linux-image-gke
-
4.15.0.1119.120
Available with Ubuntu Pro
-
linux-image-gcp
-
4.15.0.1119.120
Available with Ubuntu Pro
-
linux-image-aws-hwe
-
4.15.0.1124.114
Available with Ubuntu Pro
-
linux-image-generic-hwe-16.04
-
4.15.0.173.165
Available with Ubuntu Pro
-
linux-image-4.15.0-173-lowlatency
-
4.15.0-173.182~16.04.1
Available with Ubuntu Pro
-
linux-image-oracle
-
4.15.0.1090.78
Available with Ubuntu Pro
-
linux-image-virtual-hwe-16.04
-
4.15.0.173.165
Available with Ubuntu Pro
Ubuntu 14.04
-
linux-image-4.15.0-1134-azure
-
4.15.0-1134.147~14.04.1
Available with Ubuntu Pro
-
linux-image-azure
-
4.15.0.1134.107
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.