First published: Tue Aug 02 2022(Updated: )
Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel did not properly perform data validation. A local attacker could use this to escalate privileges in certain situations.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-oem-22.04 | <5.17.0.1014.13 | 5.17.0.1014.13 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-5.17.0-1014-oem | <5.17.0-1014.15 | 5.17.0-1014.15 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-22.04a | <5.17.0.1014.13 | 5.17.0.1014.13 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/linux-image-oem-20.04c | <5.14.0.1046.42 | 5.14.0.1046.42 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04b | <5.14.0.1046.42 | 5.14.0.1046.42 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04 | <5.14.0.1046.42 | 5.14.0.1046.42 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.14.0-1046-oem | <5.14.0-1046.53 | 5.14.0-1046.53 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel (OEM) vulnerability is USN-5545-1.
The vulnerability allows a local attacker to escalate privileges in certain situations.
Ubuntu versions 22.04 and 20.04 are affected by this vulnerability.
To fix this vulnerability, update your Linux kernel packages to the recommended versions: 5.17.0.1014.13 for Ubuntu 22.04, and 5.14.0.1046.42 for Ubuntu 20.04.
You can find more information about this vulnerability at the following references: [CVE-2022-34918](https://ubuntu.com/security/CVE-2022-34918), [USN-5540-1](https://ubuntu.com/security/notices/USN-5540-1), [USN-5544-1](https://ubuntu.com/security/notices/USN-5544-1).