CWE
416 476 362
Advisory Published

USN-5650-1: Linux kernel vulnerabilities

First published: Fri Sep 30 2022(Updated: )

It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33655) It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33656) Christian Brauner discovered that the XFS file system implementation in the Linux kernel did not properly handle setgid file creation. A local attacker could use this to gain elevated privileges. (CVE-2021-4037) It was discovered that the ext4 file system implementation in the Linux kernel did not properly initialize memory in some situations. A privileged local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0850) Duoming Zhou discovered that the AX.25 amateur radio protocol implementation in the Linux kernel did not handle detach events properly in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1199) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel during device detach operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1204) Norbert Slusarek discovered that a race condition existed in the perf subsystem in the Linux kernel, resulting in a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1729) It was discovered that the Packet network protocol implementation in the Linux kernel contained an out-of-bounds access. A remote attacker could use this to expose sensitive information (kernel memory). (CVE-2022-20368) It was discovered that the Open vSwitch implementation in the Linux kernel contained an out of bounds write vulnerability in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2639) Jann Horn discovered that the ASIX AX88179/178A USB Ethernet driver in the Linux kernel contained multiple out-of-bounds vulnerabilities. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2964) Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978) Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028) It was discovered that the Journaled File System (JFS) in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3202) Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-36946)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/linux-image-virtual<4.4.0.234.240
4.4.0.234.240
=16.04
All of
ubuntu/linux-image-generic<4.4.0.234.240
4.4.0.234.240
=16.04
All of
ubuntu/linux-image-aws<4.4.0.1151.155
4.4.0.1151.155
=16.04
All of
ubuntu/linux-image-4.4.0-234-lowlatency<4.4.0-234.268
4.4.0-234.268
=16.04
All of
ubuntu/linux-image-4.4.0-234-generic<4.4.0-234.268
4.4.0-234.268
=16.04
All of
ubuntu/linux-image-4.4.0-1114-kvm<4.4.0-1114.124
4.4.0-1114.124
=16.04
All of
ubuntu/linux-image-4.4.0-1151-aws<4.4.0-1151.166
4.4.0-1151.166
=16.04
All of
ubuntu/linux-image-kvm<4.4.0.1114.111
4.4.0.1114.111
=16.04
All of
ubuntu/linux-image-lowlatency<4.4.0.234.240
4.4.0.234.240
=16.04
All of
ubuntu/linux-image-4.4.0-234-generic<4.4.0-234.268~14.04.1
4.4.0-234.268~14.04.1
=14.04
All of
ubuntu/linux-image-generic-lts-xenial<4.4.0.234.203
4.4.0.234.203
=14.04
All of
ubuntu/linux-image-4.4.0-1113-aws<4.4.0-1113.119
4.4.0-1113.119
=14.04
All of
ubuntu/linux-image-lowlatency-lts-xenial<4.4.0.234.203
4.4.0.234.203
=14.04
All of
ubuntu/linux-image-aws<4.4.0.1113.110
4.4.0.1113.110
=14.04
All of
ubuntu/linux-image-4.4.0-234-lowlatency<4.4.0-234.268~14.04.1
4.4.0-234.268~14.04.1
=14.04
All of
ubuntu/linux-image-virtual-lts-xenial<4.4.0.234.203
4.4.0.234.203
=14.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of USN-5650-1?

    The severity of USN-5650-1 is high.

  • How does the Linux kernel vulnerability CVE-2021-33655 affect Ubuntu 16.04?

    The Linux kernel vulnerability CVE-2021-33655 affects Ubuntu 16.04 and can be exploited by a local attacker to cause a denial of service or execute arbitrary code.

  • Which packages are affected by the Linux kernel vulnerability CVE-2021-33655?

    The Linux kernel vulnerability CVE-2021-33655 affects the linux-image-virtual, linux-image-generic, linux-image-aws, linux-image-4.4.0-234-lowlatency, and linux-image-4.4.0-234-generic packages in Ubuntu 16.04.

  • How can I fix the Linux kernel vulnerability CVE-2021-33655 in Ubuntu 16.04?

    To fix the Linux kernel vulnerability CVE-2021-33655 in Ubuntu 16.04, update the affected packages to version 4.4.0.234.240 or later.

  • Where can I find more information about USN-5650-1 and the associated vulnerabilities?

    More information about USN-5650-1 and the associated vulnerabilities can be found at the following links: [reference links]

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203