[LSN-0086-1] Linux kernel vulnerability


Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 20.04 LTS – Ubuntu 18.04 LTS – Ubuntu 16.04 ESM – Ubuntu 22.04 LTS – Ubuntu 14.04 ESM
Summary
Several security issues were fixed in the kernel.
Software Description
– linux – Linux kernel – linux-aws – Linux kernel for Amazon Web Services (AWS) systems – linux-azure – Linux kernel for Microsoft Azure Cloud systems – linux-gcp – Linux kernel for Google Cloud Platform (GCP) systems – linux-gke – Linux kernel for Google Container Engine (GKE) systems – linux-gkeop – Linux kernel for Google Container Engine (GKE) systems – linux-ibm – Linux kernel for IBM cloud systems – linux-oem – Linux kernel for OEM systems
Details
It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39713)
Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. (CVE-2022-0492)
It was discovered that the network traffic control implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1055)
Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux kernel contained in integer overflow. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1116)
It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499)
Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-29581)
Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions. (CVE-2022-30594)
Update instructions
The problem can be corrected by updating your kernel livepatch to the following versions:
Ubuntu 20.04 LTS aws – 86.3 azure – 86.3 gcp – 86.3 generic – 86.3 gke – 86.3 gkeop – 86.3 ibm – 86.3 lowlatency – 86.3
Ubuntu 18.04 LTS aws – 86.3 azure – 86.3 gcp – 86.3 generic – 86.3 gke – 86.3 gkeop – 86.3 ibm – 86.3 lowlatency – 86.3 oem – 86.3
Ubuntu 16.04 ESM aws – 86.3 azure – 86.3 gcp – 86.3 generic – 86.3 lowlatency – 86.3
Ubuntu 22.04 LTS gcp – 86.4 generic – 86.4 gke – 86.4 ibm – 86.4 lowlatency – 86.4
Ubuntu 14.04 ESM generic – 86.3 lowlatency – 86.3
Support Information
Kernels older than the levels listed below do not receive livepatch updates. If you are running a kernel version earlier than the one listed below, please upgrade your kernel as soon as possible.
Ubuntu 20.04 LTS linux-aws – 5.4.0-1009 linux-aws – 5.4.0-1061 linux-azure – 5.4.0-1010 linux-gcp – 5.4.0-1009 linux-gke – 5.4.0-1033 linux-gkeop – 5.4.0-1009 linux-hwe – 5.15.0-0 linux-ibm – 5.4.0-1009 linux-oem – 5.4.0-26 linux – 5.4.0-26
Ubuntu 18.04 LTS linux-aws-5.4 – 5.4.0-1069 linux-aws – 4.15.0-1054 linux-azure-4.15 – 4.15.0-1115 linux-azure-5.4 – 5.4.0-1069 linux-gcp-4.15 – 4.15.0-1121 linux-gcp-5.4 – 5.4.0-1069 linux-gke-4.15 – 4.15.0-1076 linux-gke-5.4 – 5.4.0-1009 linux-gkeop-5.4 – 5.4.0-1007 linux-hwe-5.4 – 5.4.0-26 linux-ibm-5.4 – 5.4.0-1009 linux-oem – 4.15.0-1063 linux – 4.15.0-69
Ubuntu 16.04 ESM linux-aws-hwe – 4.15.0-1126 linux-aws – 4.4.0-1098 linux-aws – 4.4.0-1129 linux-azure – 4.15.0-1063 linux-azure – 4.15.0-1078 linux-azure – 4.15.0-1114 linux-gcp – 4.15.0-1118 linux-hwe – 4.15.0-143 linux-hwe – 4.15.0-69 linux – 4.4.0-168 linux – 4.4.0-211
Ubuntu 22.04 LTS linux-aws – 5.15.0-1000 linux-azure – 5.15.0-1000 linux-gcp – 5.15.0-1000 linux-gke – 5.15.0-1000 linux-ibm – 5.15.0-1000 linux – 5.15.0-24 linux – 5.15.0-25
Ubuntu 14.04 ESM linux-lts-xenial – 4.4.0-168
References
– CVE-2021-39713 – CVE-2022-0492 – CVE-2022-1055 – CVE-2022-1116 – CVE-2022-21499 – CVE-2022-29581 – CVE-2022-30594