First published: Wed Jun 01 2022(Updated: )
Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-29581) Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux kernel contained in integer overflow. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1116) Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions. (CVE-2022-30594)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-gkeop-5.4 | <5.4.0.1043.46 | 5.4.0.1043.46 |
=20.04 | ||
All of | ||
ubuntu/linux-image-bluefield | <5.4.0.1036.37 | 5.4.0.1036.37 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1043-gkeop | <5.4.0-1043.44 | 5.4.0-1043.44 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oracle-lts-20.04 | <5.4.0.1073.73 | 5.4.0.1073.73 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gkeop | <5.4.0.1043.46 | 5.4.0.1043.46 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1062-raspi | <5.4.0-1062.70 | 5.4.0-1062.70 |
=20.04 | ||
All of | ||
ubuntu/linux-image-raspi | <5.4.0.1062.96 | 5.4.0.1062.96 |
=20.04 | ||
All of | ||
ubuntu/linux-image-raspi2 | <5.4.0.1062.96 | 5.4.0.1062.96 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1073-oracle | <5.4.0-1073.79 | 5.4.0-1073.79 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1036-bluefield | <5.4.0-1036.39 | 5.4.0-1036.39 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1043-gkeop | <5.4.0-1043.44~18.04.1 | 5.4.0-1043.44~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-raspi-hwe-18.04 | <5.4.0.1062.63 | 5.4.0.1062.63 |
=18.04 | ||
All of | ||
ubuntu/linux-image-ibm | <5.4.0.1023.39 | 5.4.0.1023.39 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1075-gcp | <5.4.0-1075.80~18.04.1 | 5.4.0-1075.80~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1062-raspi | <5.4.0-1062.70~18.04.1 | 5.4.0-1062.70~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gkeop-5.4 | <5.4.0.1043.44~18.04.42 | 5.4.0.1043.44~18.04.42 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1073-oracle | <5.4.0-1073.79~18.04.1 | 5.4.0-1073.79~18.04.1 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.4.0.1075.58 | 5.4.0.1075.58 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oracle | <5.4.0.1073.79~18.04.52 | 5.4.0.1073.79~18.04.52 |
=18.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1023-ibm | <5.4.0-1023.25~18.04.1 | 5.4.0-1023.25~18.04.1 |
=18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-5442-2 is high.
The vulnerability can lead to a use-after-free vulnerability, allowing a local attacker to cause a denial of service or execute arbitrary code.
Ubuntu version 20.04 and 18.04 are affected by USN-5442-2.
To fix USN-5442-2 on Ubuntu 20.04, update to Linux kernel version 5.4.0.1043.46 or higher.
You can find more information about USN-5442-2 vulnerabilities on the Ubuntu security website.