First published: Wed Jun 01 2022(Updated: )
Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-29581) Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions. (CVE-2022-30594)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.13.0-1030-oracle | <5.13.0-1030.35 | 5.13.0-1030.35 |
=21.10 | ||
All of | ||
ubuntu/linux-image-oracle | <5.13.0.1030.30 | 5.13.0.1030.30 |
=21.10 | ||
All of | ||
ubuntu/linux-image-oracle | <5.13.0.1030.35~20.04.1 | 5.13.0.1030.35~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-1030-oracle | <5.13.0-1030.35~20.04.1 | 5.13.0-1030.35~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.13.0.1027.32~20.04.1 | 5.13.0.1027.32~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-1027-gcp | <5.13.0-1027.32~20.04.1 | 5.13.0-1027.32~20.04.1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-5443-2.
The severity of USN-5443-2 is not specified.
A local attacker can exploit this vulnerability to cause a denial of service (system crash) or execute arbitrary code.
Versions 21.10, 20.04, and Ubuntu Ubuntu are affected by this vulnerability.
To fix USN-5443-2, update to version 5.13.0-1030.35 for the linux-image-5.13.0-1030-oracle package (for versions 21.10 and 20.04) or update to version 5.13.0-1027.32~20.04.1 for the linux-image-5.13.0-1027-gcp package (for version 20.04).