First published: Tue May 24 2022(Updated: )
Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-oem-22.04 | <5.17.0.1006.6 | 5.17.0.1006.6 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-22.04a | <5.17.0.1006.6 | 5.17.0.1006.6 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.17.0-1006-oem | <5.17.0-1006.6 | 5.17.0-1006.6 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-20.04c | <5.14.0.1038.35 | 5.14.0.1038.35 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04b | <5.14.0.1038.35 | 5.14.0.1038.35 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04 | <5.14.0.1038.35 | 5.14.0.1038.35 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.14.0-1038-oem | <5.14.0-1038.42 | 5.14.0-1038.42 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-5444-1.
The vulnerability can be used by a local attacker to cause a denial of service or execute arbitrary code.
The affected Linux kernel versions include linux-image-oem-22.04, linux-image-oem-20.04c, linux-image-oem-20.04b, linux-image-oem-20.04d, and linux-image-5.14.0-1038-oem.
To fix the vulnerability, update your Linux kernel to version 5.17.0.1006.6 for linux-image-oem-22.04, version 5.14.0.1038.35 for linux-image-oem-20.04c, linux-image-oem-20.04b, linux-image-oem-20.04d, and version 5.14.0-1038.42 for linux-image-5.14.0-1038-oem.
More information about the vulnerability can be found on the Ubuntu Security Notices website.