{"id":45147,"date":"2022-02-09T11:16:11","date_gmt":"2022-02-09T02:16:11","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-5278-1-linux-kernel-oem-vulnerabilities\/"},"modified":"2022-02-09T12:34:06","modified_gmt":"2022-02-09T03:34:06","slug":"usn-5278-1-linux-kernel-oem-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-5278-1-linux-kernel-oem-vulnerabilities\/","title":{"rendered":"USN-5278-1: Linux kernel (OEM) vulnerabilities"},"content":{"rendered":"<p>USN-5278-1: Linux kernel (OEM) vulnerabilities<\/p>\n<p>It was discovered that the rlimit tracking for user namespaces in the Linux<br \/>\nkernel did not properly perform reference counting, leading to a use-after-<br \/>\nfree vulnerability. A local attacker could use this to cause a denial of<br \/>\nservice or possibly execute arbitrary code. (CVE-2022-24122)<\/p>\n<p>It was discovered that the BPF verifier in the Linux kernel did not<br \/>\nproperly restrict pointer types in certain situations. A local attacker<br \/>\ncould use this to cause a denial of service (system crash) or possibly<br \/>\nexecute arbitrary code. (CVE-2022-23222)<\/p>\n<p>Jeremy Cline discovered a use-after-free in the nouveau graphics driver of<br \/>\nthe Linux kernel during device removal. A privileged or physically<br \/>\nproximate attacker could use this to cause a denial of service (system<br \/>\ncrash). (CVE-2020-27820)<\/p>\n<p>It was discovered that the Packet network protocol implementation in the<br \/>\nLinux kernel contained a double-free vulnerability. A local attacker could<br \/>\nuse this to cause a denial of service (system crash) or possibly execute<br \/>\narbitrary code. (CVE-2021-22600)<\/p>\n<p>J\u00fcrgen Gro\u00df discovered that the Xen subsystem within the Linux kernel did<br \/>\nnot adequately limit the number of events driver domains (unprivileged PV<br \/>\nbackends) could send to other guest VMs. An attacker in a driver domain<br \/>\ncould use this to cause a denial of service in other guest VMs.<br \/>\n(CVE-2021-28713)<\/p>\n<p>J\u00fcrgen Gro\u00df discovered that the Xen network backend driver in the Linux<br \/>\nkernel did not adequately limit the amount of queued packets when a guest<br \/>\ndid not process them. An attacker in a guest VM can use this to cause a<br \/>\ndenial of service (excessive kernel memory consumption) in the network<br \/>\nbackend domain. (CVE-2021-28714, CVE-2021-28715)<\/p>\n<p>Szymon Heidrich discovered that the USB Gadget subsystem in the Linux<br \/>\nkernel did not properly restrict the size of control requests for certain<br \/>\ngadget types, leading to possible out of bounds reads or writes. A local<br \/>\nattacker could use this to cause a denial of service (system crash) or<br \/>\npossibly execute arbitrary code. (CVE-2021-39685)<\/p>\n<p>It was discovered that the eBPF implementation in the Linux kernel<br \/>\ncontained a race condition around read-only maps. A privileged attacker<br \/>\ncould use this to modify read-only maps. (CVE-2021-4001)<\/p>\n<p>Jann Horn discovered a race condition in the Unix domain socket<br \/>\nimplementation in the Linux kernel that could result in a read-after-free.<br \/>\nA local attacker could use this to cause a denial of service (system crash)<br \/>\nor possibly execute arbitrary code. (CVE-2021-4083)<\/p>\n<p>It was discovered that the simulated networking device driver for the Linux<br \/>\nkernel did not properly initialize memory in certain situations. A local<br \/>\nattacker could use this to expose sensitive information (kernel memory).<br \/>\n(CVE-2021-4135)<\/p>\n<p>Kirill Tkhai discovered that the XFS file system implementation in the<br \/>\nLinux kernel did not calculate size correctly when pre-allocating space in<br \/>\nsome situations. A local attacker could use this to expose sensitive<br \/>\ninformation. (CVE-2021-4155)<\/p>\n<p>Eric Biederman discovered that the cgroup process migration implementation<br \/>\nin the Linux kernel did not perform permission checks correctly in some<br \/>\nsituations. A local attacker could possibly use this to gain administrative<br \/>\nprivileges. (CVE-2021-4197)<\/p>\n<p>Brendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device<br \/>\ndriver in the Linux kernel did not properly validate meta-data coming from<br \/>\nthe device. A local attacker who can control an emulated device can use<br \/>\nthis to cause a denial of service (system crash) or possibly execute<br \/>\narbitrary code. (CVE-2021-43975)<\/p>\n<p>It was discovered that the ARM Trusted Execution Environment (TEE)<br \/>\nsubsystem in the Linux kernel contained a race condition leading to a use-<br \/>\nafter-free vulnerability. A local attacker could use this to cause a denial<br \/>\nof service or possibly execute arbitrary code. (CVE-2021-44733)<\/p>\n<p>It was discovered that the Phone Network protocol (PhoNet) implementation<br \/>\nin the Linux kernel did not properly perform reference counting in some<br \/>\nerror conditions. A local attacker could possibly use this to cause a<br \/>\ndenial of service (memory exhaustion). (CVE-2021-45095)<\/p>\n<p>It was discovered that the Reliable Datagram Sockets (RDS) protocol<br \/>\nimplementation in the Linux kernel did not properly deallocate memory in<br \/>\nsome error conditions. A local attacker could possibly use this to cause a<br \/>\ndenial of service (memory exhaustion). (CVE-2021-45480)<\/p>\n<p>It was discovered that the BPF subsystem in the Linux kernel did not<br \/>\nproperly track pointer types on atomic fetch operations in some situations.<br \/>\nA local attacker could use this to expose sensitive information (kernel<br \/>\npointer addresses). (CVE-2022-0264)<\/p>\n<p>Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in<br \/>\nthe Linux kernel did not perform a GPU TLB flush in some situations. A<br \/>\nlocal attacker could use this to cause a denial of service or possibly<br \/>\nexecute arbitrary code. (CVE-2022-0330)<\/p>\n<p>It was discovered that the TIPC Protocol implementation in the Linux kernel<br \/>\ndid not properly initialize memory in some situations. A local attacker<br \/>\ncould use this to expose sensitive information (kernel memory).<br \/>\n(CVE-2022-0382)<\/p>\n<p>It was discovered that the VMware Virtual GPU driver in the Linux kernel<br \/>\ndid not properly handle certain failure conditions, leading to a stale<br \/>\nentry in the file descriptor table. A local attacker could use this to<br \/>\nexpose sensitive information or possibly gain administrative privileges.<br \/>\n(CVE-2022-22942)<br \/>\nSource: <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-5278-1\" target=\"_blank\" rel=\"noopener\">USN-5278-1: Linux kernel (OEM) vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-5278-1: Linux kernel (OEM) vulnerabilities It was discovered that the rlimit tracking for user namespaces in the Linux kernel did not properly perform reference counting, leading to a use-after- free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-24122) It was discovered that the BPF verifier in the Linux kernel did not properly restrict pointer types in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-23222) Jeremy Cline discovered a use-after-free in the nouveau graphics driver of the Linux kernel during device removal. A privileged or physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-27820) It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-5278-1-linux-kernel-oem-vulnerabilities\/\" title=\"USN-5278-1: Linux kernel (OEM) vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-45147","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=45147"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45147\/revisions"}],"predecessor-version":[{"id":45148,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45147\/revisions\/45148"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=45147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=45147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=45147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}