{"id":48811,"date":"2022-11-16T20:00:00","date_gmt":"2022-11-16T11:00:00","guid":{"rendered":"https:\/\/jirak.net\/wp\/lsn-0090-1-kernel-live-patch-security-notice\/"},"modified":"2022-11-17T04:34:18","modified_gmt":"2022-11-16T19:34:18","slug":"lsn-0090-1-kernel-live-patch-security-notice","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/lsn-0090-1-kernel-live-patch-security-notice\/","title":{"rendered":"LSN-0090-1: Kernel Live Patch Security Notice"},"content":{"rendered":"<p>LSN-0090-1: Kernel Live Patch Security Notice<\/p>\n<p>David Bouman discovered that the netfilter subsystem in the Linux kernel<br \/>\ndid not properly validate passed user register indices. A local attacker<br \/>\ncould use this to cause a denial of service or possibly execute<br \/>\narbitrary code. (CVE-2022-1015)<\/p>\n<p>David Bouman and Billy Jheng Bing Jhong discovered that a race condition<br \/>\nexisted in the io_uring subsystem in the Linux kernel, leading to a use-<br \/>\nafter-free vulnerability. A local attacker could use this to cause a<br \/>\ndenial of service (system crash) or possibly execute arbitrary code.(CVE-2022-2602)<\/p>\n<p>S\u00f6nke Huster discovered that an integer overflow vulnerability existed<br \/>\nin the WiFi driver stack in the Linux kernel, leading to a buffer<br \/>\noverflow. A physically proximate attacker could use this to cause an<br \/>\ndenial of service (system crash) or possibly execute arbitrary code.(CVE-2022-41674)<\/p>\n<p>S\u00f6nke Huster discovered that the WiFi driver stack in the Linux kernel did<br \/>\nnot properly perform reference counting in some situations, leading to a<br \/>\nuse-after-free vulnerability. A physically proximate attacker could use<br \/>\nthis to cause a denial of service (system crash) or possibly execute<br \/>\narbitrary code. (CVE-2022-42720)<\/p>\n<p>S\u00f6nke Huster discovered that the WiFi driver stack in the Linux kernel did<br \/>\nnot properly handle BSSID\/SSID lists in some situations. A physically<br \/>\nproximate attacker could use this to cause a denial of service (infinite<br \/>\nloop). (CVE-2022-42721)<\/p>\n<p>S\u00f6nke Huster discovered that the WiFi driver stack in the Linux kernel<br \/>\ncontained a NULL pointer dereference vulnerability in certain situations. A<br \/>\nphysically proximate attacker could use this to cause a denial of service<br \/>\n(system crash). (CVE-2022-42722)<br \/>\nSource: <a href=\"https:\/\/ubuntu.com\/security\/notices\/LSN-0090-1\" target=\"_blank\" rel=\"noopener\">LSN-0090-1: Kernel Live Patch Security Notice<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>LSN-0090-1: Kernel Live Patch Security Notice David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-1015) David Bouman and Billy Jheng Bing Jhong discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.(CVE-2022-2602) S\u00f6nke Huster discovered that an integer overflow vulnerability existed in the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A physically proximate attacker could use this to cause an denial of service (system crash) or possibly execute arbitrary code.(CVE-2022-41674) S\u00f6nke Huster discovered that the WiFi driver stack <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/lsn-0090-1-kernel-live-patch-security-notice\/\" title=\"LSN-0090-1: Kernel Live Patch Security Notice\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-48811","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/48811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=48811"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/48811\/revisions"}],"predecessor-version":[{"id":48812,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/48811\/revisions\/48812"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=48811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=48811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=48811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}