First published: Thu Mar 31 2022(Updated: )
It was discovered that the IPsec implementation in the Linux kernel did not properly allocate enough memory when performing ESP transformations, leading to a heap-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-1120-gcp | <4.15.0-1120.134 | 4.15.0-1120.134 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gcp-lts-18.04 | <4.15.0.1120.139 | 4.15.0.1120.139 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oracle-lts-18.04 | <4.15.0.1091.101 | 4.15.0.1091.101 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1091-oracle | <4.15.0-1091.100 | 4.15.0-1091.100 |
=18.04 | ||
All of | ||
ubuntu/linux-image-raspi2 | <4.15.0.1107.105 | 4.15.0.1107.105 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1107-raspi2 | <4.15.0-1107.114 | 4.15.0-1107.114 |
=18.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.15.0.1136.126 | 4.15.0.1136.126 |
=16.04 | ||
All of | ||
ubuntu/linux-image-oracle | <4.15.0.1091.79 | 4.15.0.1091.79 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1126-aws-hwe | <4.15.0-1126.135~16.04.2 | 4.15.0-1126.135~16.04.2 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1120-gcp | <4.15.0-1120.134~16.04.1 | 4.15.0-1120.134~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-gke | <4.15.0.1120.121 | 4.15.0.1120.121 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1091-oracle | <4.15.0-1091.100~16.04.1 | 4.15.0-1091.100~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-gcp | <4.15.0.1120.121 | 4.15.0.1120.121 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1136-azure | <4.15.0-1136.149~16.04.1 | 4.15.0-1136.149~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-aws-hwe | <4.15.0.1126.116 | 4.15.0.1126.116 |
=16.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.15.0.1136.108 | 4.15.0.1136.108 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1136-azure | <4.15.0-1136.149~14.04.1 | 4.15.0-1136.149~14.04.1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability allows a local attacker to cause a denial of service (system crash) or possibly execute arbitrary code.
Users running Ubuntu 16.04, Ubuntu 18.04, and Ubuntu 20.04 are affected.
Update the Linux kernel to versions 4.15.0-1120.134, 4.15.0.1120.139, 4.15.0.1091.101, 4.15.0-1091.100, 4.15.0.1107.105, 4.15.0-1107.114, 4.15.0.1136.126, 4.15.0.1091.79, 4.15.0-1126.135~16.04.2, 4.15.0-1120.134~16.04.1, 4.15.0.1120.121, 4.15.0-1091.100~16.04.1, 4.15.0.1120.121, 4.15.0-1136.149~16.04.1, 4.15.0.1126.116, 4.15.0.1136.108, 4.15.0-1136.149~14.04.1, or higher.
You can find more information about USN-5357-2 on the Ubuntu security website.
The Common Weakness Enumeration (CWE) ID for USN-5357-2 is CWE-119.