USN-5505-1

Source
https://ubuntu.com/security/notices/USN-5505-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5505-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5505-1
Related
Published
2022-07-07T07:59:25.123060Z
Modified
2022-07-07T07:59:25.123060Z
Summary
linux-lts-xenial, linux-kvm vulnerabilities
Details

Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609)

Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3752)

It was discovered that the NFC subsystem in the Linux kernel contained a use-after-free vulnerability in its NFC Controller Interface (NCI) implementation. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-3760)

Szymon Heidrich discovered that the USB Gadget subsystem in the Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to possible out of bounds reads or writes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39685)

It was discovered that the Ion Memory Manager subsystem in the Linux kernel contained a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-39714)

Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4202)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-0330)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation in the Linux kernel was subject to a race condition, potentially leading to an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1734)

It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could use this to cause a denial of service. (CVE-2022-28356)

It was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-28388)

References

Affected packages

Ubuntu:Pro:14.04:LTS / linux-lts-xenial

Package

Name
linux-lts-xenial
Purl
pkg:deb/ubuntu/linux-lts-xenial?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-229.263~14.04.1

Affected versions

4.*

4.4.0-13.29~14.04.1
4.4.0-14.30~14.04.2
4.4.0-15.31~14.04.1
4.4.0-18.34~14.04.1
4.4.0-21.37~14.04.1
4.4.0-22.39~14.04.1
4.4.0-22.40~14.04.1
4.4.0-24.43~14.04.1
4.4.0-28.47~14.04.1
4.4.0-31.50~14.04.1
4.4.0-34.53~14.04.1
4.4.0-36.55~14.04.1
4.4.0-38.57~14.04.1
4.4.0-42.62~14.04.1
4.4.0-45.66~14.04.1
4.4.0-47.68~14.04.1
4.4.0-51.72~14.04.1
4.4.0-53.74~14.04.1
4.4.0-57.78~14.04.1
4.4.0-59.80~14.04.1
4.4.0-62.83~14.04.1
4.4.0-63.84~14.04.2
4.4.0-64.85~14.04.1
4.4.0-66.87~14.04.1
4.4.0-67.88~14.04.1
4.4.0-70.91~14.04.1
4.4.0-71.92~14.04.1
4.4.0-72.93~14.04.1
4.4.0-75.96~14.04.1
4.4.0-78.99~14.04.2
4.4.0-79.100~14.04.1
4.4.0-81.104~14.04.1
4.4.0-83.106~14.04.1
4.4.0-87.110~14.04.1
4.4.0-89.112~14.04.1
4.4.0-91.114~14.04.1
4.4.0-92.115~14.04.1
4.4.0-93.116~14.04.1
4.4.0-96.119~14.04.1
4.4.0-97.120~14.04.1
4.4.0-98.121~14.04.1
4.4.0-101.124~14.04.1
4.4.0-103.126~14.04.1
4.4.0-104.127~14.04.1
4.4.0-108.131~14.04.1
4.4.0-109.132~14.04.1
4.4.0-111.134~14.04.1
4.4.0-112.135~14.04.1
4.4.0-116.140~14.04.1
4.4.0-119.143~14.04.1
4.4.0-121.145~14.04.1
4.4.0-124.148~14.04.1
4.4.0-127.153~14.04.1
4.4.0-128.154~14.04.1
4.4.0-130.156~14.04.1
4.4.0-131.157~14.04.1
4.4.0-133.159~14.04.1
4.4.0-134.160~14.04.1
4.4.0-135.161~14.04.1
4.4.0-137.163~14.04.1
4.4.0-138.164~14.04.1
4.4.0-139.165~14.04.1
4.4.0-140.166~14.04.1
4.4.0-141.167~14.04.1
4.4.0-142.168~14.04.1
4.4.0-143.169~14.04.2
4.4.0-144.170~14.04.1
4.4.0-146.172~14.04.1
4.4.0-148.174~14.04.1
4.4.0-164.192~14.04.1
4.4.0-165.193~14.04.1
4.4.0-166.195~14.04.1
4.4.0-168.197~14.04.1
4.4.0-169.198~14.04.1
4.4.0-170.199~14.04.1
4.4.0-171.200~14.04.1
4.4.0-173.203~14.04.1
4.4.0-174.204~14.04.1
4.4.0-176.206~14.04.1
4.4.0-177.207~14.04.1
4.4.0-178.208~14.04.1
4.4.0-179.209~14.04.1
4.4.0-184.214~14.04.1
4.4.0-185.215~14.04.1
4.4.0-186.216~14.04.1
4.4.0-187.217~14.04.1
4.4.0-189.219~14.04.1
4.4.0-190.220~14.04.1
4.4.0-193.224~14.04.1
4.4.0-194.226~14.04.1
4.4.0-197.229~14.04.1
4.4.0-198.230~14.04.1
4.4.0-200.232~14.04.1
4.4.0-201.233~14.04.1
4.4.0-203.235~14.04.1
4.4.0-204.236~14.04.1
4.4.0-206.238~14.04.1
4.4.0-208.240~14.04.1
4.4.0-209.241~14.04.1
4.4.0-210.242~14.04.1
4.4.0-211.243~14.04.1
4.4.0-212.244~14.04.1
4.4.0-213.245~14.04.1
4.4.0-214.246~14.04.1
4.4.0-215.247~14.04.1
4.4.0-218.251~14.04.1
4.4.0-219.252~14.04.1
4.4.0-221.254~14.04.1
4.4.0-222.255~14.04.1
4.4.0-223.256~14.04.1
4.4.0-224.257~14.04.1
4.4.0-227.261~14.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "block-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "crypto-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "fat-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "fb-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "firewire-core-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "floppy-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "fs-core-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "fs-secondary-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "input-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "ipmi-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "irda-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "kernel-image-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-buildinfo-4.4.0-229-generic"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-buildinfo-4.4.0-229-lowlatency"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-cloud-tools-4.4.0-229-generic"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-cloud-tools-4.4.0-229-lowlatency"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-headers-4.4.0-229"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-headers-4.4.0-229-generic"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-headers-4.4.0-229-lowlatency"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-image-4.4.0-229-generic"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-image-4.4.0-229-generic-dbgsym"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-image-unsigned-4.4.0-229-generic"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-image-unsigned-4.4.0-229-generic-dbgsym"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-image-unsigned-4.4.0-229-lowlatency"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-image-unsigned-4.4.0-229-lowlatency-dbgsym"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-229"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-lts-xenial-tools-4.4.0-229"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-lts-xenial-udebs-generic"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-modules-4.4.0-229-generic"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-modules-4.4.0-229-lowlatency"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-modules-extra-4.4.0-229-generic"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-tools-4.4.0-229-generic"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "linux-tools-4.4.0-229-lowlatency"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "md-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "message-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "mouse-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "multipath-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "nfs-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "nic-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "nic-pcmcia-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "nic-shared-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "nic-usb-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "parport-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "pata-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "pcmcia-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "pcmcia-storage-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "plip-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "ppp-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "sata-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "scsi-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "serial-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "speakup-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "storage-core-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "usb-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "virtio-modules-4.4.0-229-generic-di"
        },
        {
            "binary_version": "4.4.0-229.263~14.04.1",
            "binary_name": "vlan-modules-4.4.0-229-generic-di"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1110.120

Affected versions

4.*

4.4.0-1004.9
4.4.0-1007.12
4.4.0-1008.13
4.4.0-1009.14
4.4.0-1010.15
4.4.0-1012.17
4.4.0-1013.18
4.4.0-1015.20
4.4.0-1017.22
4.4.0-1019.24
4.4.0-1020.25
4.4.0-1021.26
4.4.0-1023.28
4.4.0-1026.31
4.4.0-1027.32
4.4.0-1029.34
4.4.0-1031.37
4.4.0-1032.38
4.4.0-1033.39
4.4.0-1035.41
4.4.0-1036.42
4.4.0-1037.43
4.4.0-1038.44
4.4.0-1039.45
4.4.0-1040.46
4.4.0-1041.47
4.4.0-1043.49
4.4.0-1044.50
4.4.0-1046.52
4.4.0-1047.53
4.4.0-1048.55
4.4.0-1051.58
4.4.0-1052.59
4.4.0-1054.61
4.4.0-1056.63
4.4.0-1058.65
4.4.0-1059.66
4.4.0-1060.67
4.4.0-1062.69
4.4.0-1063.70
4.4.0-1064.71
4.4.0-1065.72
4.4.0-1066.73
4.4.0-1068.75
4.4.0-1069.76
4.4.0-1070.77
4.4.0-1071.78
4.4.0-1075.82
4.4.0-1076.83
4.4.0-1077.84
4.4.0-1078.85
4.4.0-1079.86
4.4.0-1080.87
4.4.0-1082.91
4.4.0-1084.93
4.4.0-1085.94
4.4.0-1087.96
4.4.0-1088.97
4.4.0-1089.98
4.4.0-1090.99
4.4.0-1091.100
4.4.0-1092.101
4.4.0-1093.102
4.4.0-1094.103
4.4.0-1095.104
4.4.0-1096.105
4.4.0-1097.106
4.4.0-1098.107
4.4.0-1099.108
4.4.0-1100.109
4.4.0-1102.111
4.4.0-1103.112
4.4.0-1104.113
4.4.0-1105.114
4.4.0-1108.118

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-buildinfo-4.4.0-1110-kvm"
        },
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-cloud-tools-4.4.0-1110-kvm"
        },
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-headers-4.4.0-1110-kvm"
        },
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-image-4.4.0-1110-kvm"
        },
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-image-4.4.0-1110-kvm-dbgsym"
        },
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-kvm-cloud-tools-4.4.0-1110"
        },
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-kvm-headers-4.4.0-1110"
        },
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-kvm-tools-4.4.0-1110"
        },
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-modules-4.4.0-1110-kvm"
        },
        {
            "binary_version": "4.4.0-1110.120",
            "binary_name": "linux-tools-4.4.0-1110-kvm"
        }
    ]
}