First published: Mon Mar 28 2022(Updated: )
It was discovered that the IPsec implementation in the Linux kernel did not properly allocate enough memory when performing ESP transformations, leading to a heap-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.14.0-1031-oem | <5.14.0-1031.34 | 5.14.0-1031.34 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04c | <5.14.0.1031.28 | 5.14.0.1031.28 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04b | <5.14.0.1031.28 | 5.14.0.1031.28 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04 | <5.14.0.1031.28 | 5.14.0.1031.28 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-5353-1.
The severity of USN-5353-1 is not mentioned in the description.
The vulnerability in the Linux kernel can cause a denial of service (system crash) or possibly execute arbitrary code.
The versions affected by USN-5353-1 are Ubuntu 20.04.
To fix the USN-5353-1 vulnerability, update the affected software to version 5.14.0-1031.34 or higher.