Ubuntu update for linux-gcp-5.4



Published: 2022-06-01
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-1116
CVE-2022-29581
CVE-2022-30594
CWE-ID CWE-190
CWE-911
CWE-276
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Ubuntu
Operating systems & Components / Operating system

linux-image-5.4.0-1073-oracle (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1062-raspi (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-raspi (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-raspi2 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-gkeop (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oracle-lts-20.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1043-gkeop (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-gkeop-5.4 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-raspi-hwe-18.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oracle (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-ibm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1023-ibm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-gcp (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1075-gcp (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Integer overflow

EUVDB-ID: #VU63633

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1116

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute code with elevated privileges.

The vulnerability exists due to integer overflow in the io_uring subsystem in the Linux kernel. A local user can trigger integer overflow, cause a denial of service or execute arbitrary code with elevated privileges.

Mitigation

Update the affected package linux-gcp-5.4 to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-5.4.0-1073-oracle (Ubuntu package): before 5.4.0-1073.79~18.04.1

linux-image-5.4.0-1062-raspi (Ubuntu package): before 5.4.0-1062.70~18.04.1

linux-image-raspi (Ubuntu package): before 5.4.0.1062.96

linux-image-raspi2 (Ubuntu package): before 5.4.0.1062.96

linux-image-gkeop (Ubuntu package): before 5.4.0.1043.46

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1073.73

linux-image-5.4.0-1043-gkeop (Ubuntu package): before 5.4.0-1043.44~18.04.1

linux-image-gkeop-5.4 (Ubuntu package): before 5.4.0.1043.46

linux-image-raspi-hwe-18.04 (Ubuntu package): before 5.4.0.1062.63

linux-image-oracle (Ubuntu package): before 5.4.0.1073.79~18.04.52

linux-image-ibm (Ubuntu package): before 5.4.0.1023.39

linux-image-5.4.0-1023-ibm (Ubuntu package): before 5.4.0-1023.25~18.04.1

linux-image-gcp (Ubuntu package): before 5.4.0.1075.58

linux-image-5.4.0-1075-gcp (Ubuntu package): before 5.4.0-1075.80~18.04.1

CPE2.3 External links

http://ubuntu.com/security/notices/USN-5442-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper update of reference count

EUVDB-ID: #VU63496

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-29581

CWE-ID: CWE-911 - Improper Update of Reference Count

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper update of reference count in net/sched in Linux kernel. A local user can execute arbitrary code with root privileges.

Mitigation

Update the affected package linux-gcp-5.4 to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-5.4.0-1073-oracle (Ubuntu package): before 5.4.0-1073.79~18.04.1

linux-image-5.4.0-1062-raspi (Ubuntu package): before 5.4.0-1062.70~18.04.1

linux-image-raspi (Ubuntu package): before 5.4.0.1062.96

linux-image-raspi2 (Ubuntu package): before 5.4.0.1062.96

linux-image-gkeop (Ubuntu package): before 5.4.0.1043.46

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1073.73

linux-image-5.4.0-1043-gkeop (Ubuntu package): before 5.4.0-1043.44~18.04.1

linux-image-gkeop-5.4 (Ubuntu package): before 5.4.0.1043.46

linux-image-raspi-hwe-18.04 (Ubuntu package): before 5.4.0.1062.63

linux-image-oracle (Ubuntu package): before 5.4.0.1073.79~18.04.52

linux-image-ibm (Ubuntu package): before 5.4.0.1023.39

linux-image-5.4.0-1023-ibm (Ubuntu package): before 5.4.0-1023.25~18.04.1

linux-image-gcp (Ubuntu package): before 5.4.0.1075.58

linux-image-5.4.0-1075-gcp (Ubuntu package): before 5.4.0-1075.80~18.04.1

CPE2.3 External links

http://ubuntu.com/security/notices/USN-5442-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Incorrect default permissions

EUVDB-ID: #VU63631

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-30594

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to mishandling seccomp permissions. A local user can bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag and escalate privileges on the system.

Mitigation

Update the affected package linux-gcp-5.4 to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-5.4.0-1073-oracle (Ubuntu package): before 5.4.0-1073.79~18.04.1

linux-image-5.4.0-1062-raspi (Ubuntu package): before 5.4.0-1062.70~18.04.1

linux-image-raspi (Ubuntu package): before 5.4.0.1062.96

linux-image-raspi2 (Ubuntu package): before 5.4.0.1062.96

linux-image-gkeop (Ubuntu package): before 5.4.0.1043.46

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1073.73

linux-image-5.4.0-1043-gkeop (Ubuntu package): before 5.4.0-1043.44~18.04.1

linux-image-gkeop-5.4 (Ubuntu package): before 5.4.0.1043.46

linux-image-raspi-hwe-18.04 (Ubuntu package): before 5.4.0.1062.63

linux-image-oracle (Ubuntu package): before 5.4.0.1073.79~18.04.52

linux-image-ibm (Ubuntu package): before 5.4.0.1023.39

linux-image-5.4.0-1023-ibm (Ubuntu package): before 5.4.0-1023.25~18.04.1

linux-image-gcp (Ubuntu package): before 5.4.0.1075.58

linux-image-5.4.0-1075-gcp (Ubuntu package): before 5.4.0-1075.80~18.04.1

CPE2.3 External links

http://ubuntu.com/security/notices/USN-5442-2


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###