First published: Fri Jul 01 2022(Updated: )
Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197) Lin Ma discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4202) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the virtual graphics memory manager implementation in the Linux kernel was subject to a race condition, potentially leading to an information leak. (CVE-2022-1419) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1734) 赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could use this to cause a denial of service. (CVE-2022-28356)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-virtual | <4.4.0.229.235 | 4.4.0.229.235 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-generic | <4.4.0.229.235 | 4.4.0.229.235 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-aws | <4.4.0.1145.149 | 4.4.0.1145.149 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-229-lowlatency | <4.4.0-229.263 | 4.4.0-229.263 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-229-generic | <4.4.0-229.263 | 4.4.0-229.263 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1145-aws | <4.4.0-1145.160 | 4.4.0-1145.160 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-lowlatency | <4.4.0.229.235 | 4.4.0.229.235 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-5500-1 is moderate.
A local attacker can exploit CVE-2021-4197 by using the cgroup process migration implementation flaw in the Linux kernel to gain administrative privileges.
This vulnerability affects Linux kernel versions 4.4.0.229.235, 4.4.0-229.263, and 4.4.0-1145.160.
To fix the Linux kernel vulnerabilities in Ubuntu 16.04, update your system to the latest version of linux-image-virtual, linux-image-generic, linux-image-aws, linux-image-4.4.0-229-lowlatency, linux-image-4.4.0-229-generic, linux-image-4.4.0-1145-aws, or linux-image-lowlatency depending on the specific package you have installed.
You can find more information about the vulnerabilities in USN-5500-1 on the Ubuntu website.