First published: Thu Mar 31 2022(Updated: )
It was discovered that the IPsec implementation in the Linux kernel did not properly allocate enough memory when performing ESP transformations, leading to a heap-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-175-lowlatency | <4.15.0-175.184 | 4.15.0-175.184 |
=18.04 | ||
All of | ||
ubuntu/linux-image-virtual | <4.15.0.175.164 | 4.15.0.175.164 |
=18.04 | ||
All of | ||
ubuntu/linux-image-aws-lts-18.04 | <4.15.0.1126.129 | 4.15.0.1126.129 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic | <4.15.0.175.164 | 4.15.0.175.164 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-175-generic | <4.15.0-175.184 | 4.15.0-175.184 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1112-kvm | <4.15.0-1112.115 | 4.15.0-1112.115 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <4.15.0.175.164 | 4.15.0.175.164 |
=18.04 | ||
All of | ||
ubuntu/linux-image-dell300x | <4.15.0.1040.42 | 4.15.0.1040.42 |
=18.04 | ||
All of | ||
ubuntu/linux-image-snapdragon | <4.15.0.1125.128 | 4.15.0.1125.128 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1040-dell300x | <4.15.0-1040.45 | 4.15.0-1040.45 |
=18.04 | ||
All of | ||
ubuntu/linux-image-azure-lts-18.04 | <4.15.0.1136.109 | 4.15.0.1136.109 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1125-snapdragon | <4.15.0-1125.134 | 4.15.0-1125.134 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1136-azure | <4.15.0-1136.149 | 4.15.0-1136.149 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1126-aws | <4.15.0-1126.135 | 4.15.0-1126.135 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-175-generic-lpae | <4.15.0-175.184 | 4.15.0-175.184 |
=18.04 | ||
All of | ||
ubuntu/linux-image-kvm | <4.15.0.1112.108 | 4.15.0.1112.108 |
=18.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.15.0.175.164 | 4.15.0.175.164 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-175-lowlatency | <4.15.0-175.184~16.04.1 | 4.15.0-175.184~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-16.04 | <4.15.0.175.167 | 4.15.0.175.167 |
=16.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-16.04 | <4.15.0.175.167 | 4.15.0.175.167 |
=16.04 | ||
All of | ||
ubuntu/linux-image-oem | <4.15.0.175.167 | 4.15.0.175.167 |
=16.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-16.04 | <4.15.0.175.167 | 4.15.0.175.167 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-175-generic | <4.15.0-175.184~16.04.1 | 4.15.0-175.184~16.04.1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-5357-1.
The severity of USN-5357-1 is not specified.
The Linux kernel vulnerability in USN-5357-1 could allow a local attacker to cause a denial of service or execute arbitrary code.
The USN-5357-1 vulnerability affects Ubuntu 18.04 and 16.04.
To fix the Linux kernel vulnerability in USN-5357-1, update the affected Ubuntu packages to the specified versions or apply the provided patches.