First published: Fri Nov 18 2022(Updated: )
It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-20422) Hsin-Wei Hung discovered that the BPF subsystem in the Linux kernel contained an out-of-bounds read vulnerability in the x86 JIT compiler. A local attacker could possibly use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2022-2905) Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978) Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028) It was discovered that the Netlink device interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3625) It was discovered that the IDT 77252 ATM PCI device driver in the Linux kernel did not properly remove any pending timers during device exit, resulting in a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-3635) Gwangun Jung discovered that the netfilter subsystem in the Linux kernel did not properly prevent binding to an already bound chain. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-39190) Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX storage controller driver in the Linux kernel did not properly handle certain structures. A local attacker could potentially use this to expose sensitive information (kernel memory). (CVE-2022-40768)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-intel-iotg | <5.15.0.1018.19 | 5.15.0.1018.19 |
=22.04 | ||
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.15.0.1018.17 | 5.15.0.1018.17 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1018-intel-iotg | <5.15.0-1018.23 | 5.15.0-1018.23 |
=22.04 | ||
All of | ||
ubuntu/linux-image-raspi | <5.15.0.1018.17 | 5.15.0.1018.17 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1018-raspi | <5.15.0-1018.20 | 5.15.0-1018.20 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1018-raspi-nolpae | <5.15.0-1018.20 | 5.15.0-1018.20 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1020-gke | <5.15.0-1020.25~20.04.1 | 5.15.0-1020.25~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1022-gcp | <5.15.0-1022.29~20.04.1 | 5.15.0-1022.29~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.15.0.1022.29~20.04.1 | 5.15.0.1022.29~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gke-5.15 | <5.15.0.1020.25~20.04.1 | 5.15.0.1020.25~20.04.1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of this advisory is USN-5729-2.
The severity of USN-5729-2 is not specified in the information provided.
A local attacker can exploit USN-5729-2 to cause a denial of service (system crash).
USN-5729-2 affects Arm 64-bit systems running the Linux kernel.
To fix USN-5729-2, update your Ubuntu system to version 5.15.0.1018.19 for linux-image-intel-iotg package, version 5.15.0.1018.17 for linux-image-raspi-nolpae package, version 5.15.0-1018.23 for linux-image-5.15.0-1018-intel-iotg package, version 5.15.0.1018.17 for linux-image-raspi package, version 5.15.0-1018.20 for linux-image-5.15.0-1018-raspi package, version 5.15.0-1018.20 for linux-image-5.15.0-1018-raspi-nolpae package, version 5.15.0-1020.25~20.04.1 for linux-image-5.15.0-1020-gke package, version 5.15.0-1022.29~20.04.1 for linux-image-5.15.0-1022-gcp package, version 5.15.0.1022.29~20.04.1 for linux-image-gcp package, or version 5.15.0.1020.25~20.04.1 for linux-image-gke-5.15 package.