First published: Tue Feb 22 2022(Updated: )
It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-22600) Jann Horn discovered a race condition in the Unix domain socket implementation in the Linux kernel that could result in a read-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4083) Kirill Tkhai discovered that the XFS file system implementation in the Linux kernel did not calculate size correctly when pre-allocating space in some situations. A local attacker could use this to expose sensitive information. (CVE-2021-4155) Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-0330) It was discovered that the VMware Virtual GPU driver in the Linux kernel did not properly handle certain failure conditions, leading to a stale entry in the file descriptor table. A local attacker could use this to expose sensitive information or possibly gain administrative privileges. (CVE-2022-22942)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.13.0-30-generic-lpae | <5.13.0-30.33 | 5.13.0-30.33 |
=21.10 | ||
All of | ||
ubuntu/linux-image-virtual | <5.13.0.30.40 | 5.13.0.30.40 |
=21.10 | ||
All of | ||
ubuntu/linux-image-generic-64k | <5.13.0.30.40 | 5.13.0.30.40 |
=21.10 | ||
All of | ||
ubuntu/linux-image-generic | <5.13.0.30.40 | 5.13.0.30.40 |
=21.10 | ||
All of | ||
ubuntu/linux-image-aws | <5.13.0.1014.15 | 5.13.0.1014.15 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-30-generic-64k | <5.13.0-30.33 | 5.13.0-30.33 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1017-raspi-nolpae | <5.13.0-1017.19 | 5.13.0-1017.19 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-30-generic | <5.13.0-30.33 | 5.13.0-30.33 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1018-oracle | <5.13.0-1018.22 | 5.13.0-1018.22 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1014-azure | <5.13.0-1014.16 | 5.13.0-1014.16 |
=21.10 | ||
All of | ||
ubuntu/linux-image-azure | <5.13.0.1014.14 | 5.13.0.1014.14 |
=21.10 | ||
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.13.0.1017.22 | 5.13.0.1017.22 |
=21.10 | ||
All of | ||
ubuntu/linux-image-oem-20.04 | <5.13.0.30.40 | 5.13.0.30.40 |
=21.10 | ||
All of | ||
ubuntu/linux-image-gcp | <5.13.0.1015.14 | 5.13.0.1015.14 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-30-lowlatency | <5.13.0-30.33 | 5.13.0-30.33 |
=21.10 | ||
All of | ||
ubuntu/linux-image-gke | <5.13.0.1015.14 | 5.13.0.1015.14 |
=21.10 | ||
All of | ||
ubuntu/linux-image-oracle | <5.13.0.1018.18 | 5.13.0.1018.18 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1017-raspi | <5.13.0-1017.19 | 5.13.0-1017.19 |
=21.10 | ||
All of | ||
ubuntu/linux-image-raspi | <5.13.0.1017.22 | 5.13.0.1017.22 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1013-kvm | <5.13.0-1013.14 | 5.13.0-1013.14 |
=21.10 | ||
All of | ||
ubuntu/linux-image-kvm | <5.13.0.1013.13 | 5.13.0.1013.13 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1015-gcp | <5.13.0-1015.18 | 5.13.0-1015.18 |
=21.10 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.13.0.30.40 | 5.13.0.30.40 |
=21.10 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.13.0.30.40 | 5.13.0.30.40 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1014-aws | <5.13.0-1014.15~20.04.1 | 5.13.0-1014.15~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oracle | <5.13.0.1018.22~20.04.1 | 5.13.0.1018.22~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-1018-oracle | <5.13.0-1018.22~20.04.1 | 5.13.0-1018.22~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.13.0.1014.15~20.04.7 | 5.13.0.1014.15~20.04.7 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of this advisory is USN-5295-2.
The severity of USN-5295-2 is not specified in the provided information.
The affected software for USN-5295-2 is Linux kernel version 5.13.0-30.33 on Ubuntu 21.10.
To fix USN-5295-2, update to Linux kernel version 5.13.0-30.33 or later.
You can find more information about USN-5295-2 in the reference links provided: [CVE-2021-22600](https://ubuntu.com/security/CVE-2021-22600), [CVE-2022-0330](https://ubuntu.com/security/CVE-2022-0330), [CVE-2022-22942](https://ubuntu.com/security/CVE-2022-22942).