{"id":45245,"date":"2022-02-18T09:35:55","date_gmt":"2022-02-18T00:35:55","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-5294-1-linux-kernel-vulnerabilities\/"},"modified":"2022-02-18T10:34:09","modified_gmt":"2022-02-18T01:34:09","slug":"usn-5294-1-linux-kernel-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-5294-1-linux-kernel-vulnerabilities\/","title":{"rendered":"USN-5294-1: Linux kernel vulnerabilities"},"content":{"rendered":"<p>USN-5294-1: Linux kernel vulnerabilities<\/p>\n<p>It was discovered that the Packet network protocol implementation in the<br \/>\nLinux kernel contained a double-free vulnerability. A local attacker could<br \/>\nuse this to cause a denial of service (system crash) or possibly execute<br \/>\narbitrary code. (CVE-2021-22600)<\/p>\n<p>Szymon Heidrich discovered that the USB Gadget subsystem in the Linux<br \/>\nkernel did not properly restrict the size of control requests for certain<br \/>\ngadget types, leading to possible out of bounds reads or writes. A local<br \/>\nattacker could use this to cause a denial of service (system crash) or<br \/>\npossibly execute arbitrary code. (CVE-2021-39685)<\/p>\n<p>Jann Horn discovered a race condition in the Unix domain socket<br \/>\nimplementation in the Linux kernel that could result in a read-after-free.<br \/>\nA local attacker could use this to cause a denial of service (system crash)<br \/>\nor possibly execute arbitrary code. (CVE-2021-4083)<\/p>\n<p>Kirill Tkhai discovered that the XFS file system implementation in the<br \/>\nLinux kernel did not calculate size correctly when pre-allocating space in<br \/>\nsome situations. A local attacker could use this to expose sensitive<br \/>\ninformation. (CVE-2021-4155)<\/p>\n<p>Lin Ma discovered that the NFC Controller Interface (NCI) implementation in<br \/>\nthe Linux kernel contained a race condition, leading to a use-after-free<br \/>\nvulnerability. A local attacker could use this to cause a denial of service<br \/>\n(system crash) or possibly execute arbitrary code. (CVE-2021-4202)<\/p>\n<p>Brendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device<br \/>\ndriver in the Linux kernel did not properly validate meta-data coming from<br \/>\nthe device. A local attacker who can control an emulated device can use<br \/>\nthis to cause a denial of service (system crash) or possibly execute<br \/>\narbitrary code. (CVE-2021-43975)<\/p>\n<p>Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in<br \/>\nthe Linux kernel did not perform a GPU TLB flush in some situations. A<br \/>\nlocal attacker could use this to cause a denial of service or possibly<br \/>\nexecute arbitrary code. (CVE-2022-0330)<\/p>\n<p>It was discovered that the VMware Virtual GPU driver in the Linux kernel<br \/>\ndid not properly handle certain failure conditions, leading to a stale<br \/>\nentry in the file descriptor table. A local attacker could use this to<br \/>\nexpose sensitive information or possibly gain administrative privileges.<br \/>\n(CVE-2022-22942)<br \/>\nSource: <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-5294-1\" target=\"_blank\" rel=\"noopener\">USN-5294-1: Linux kernel vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-5294-1: Linux kernel vulnerabilities It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-22600) Szymon Heidrich discovered that the USB Gadget subsystem in the Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to possible out of bounds reads or writes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39685) Jann Horn discovered a race condition in the Unix domain socket implementation in the Linux kernel that could result in a read-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4083) Kirill Tkhai discovered <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-5294-1-linux-kernel-vulnerabilities\/\" title=\"USN-5294-1: Linux kernel vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-45245","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=45245"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45245\/revisions"}],"predecessor-version":[{"id":45246,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45245\/revisions\/45246"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=45245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=45245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=45245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}