USN-5318-1: Linux kernel vulnerabilities

Publication date

9 March 2022

Overview

Several security issues were fixed in the Linux kernel.


Packages

Details

Nick Gregory discovered that the Linux kernel incorrectly handled network
offload functionality. A local attacker could use this to cause a denial of
service or possibly execute arbitrary code. (CVE-2022-25636)

Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano
Giuffrida discovered that hardware mitigations added by ARM to their
processors to address Spectre-BTI were insufficient. A local attacker could
potentially use this to expose sensitive information. (CVE-2022-23960)

Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano
Giuffrida discovered that hardware mitigations added by Intel to their
processors to address Spectre-BTI were insufficient. A local attacker could
potentially use this to expose sensitive information. (CVE-2022-0001,

Nick Gregory discovered that the Linux kernel incorrectly handled network
offload functionality. A local attacker could use this to cause a denial of
service or possibly execute arbitrary code. (CVE-2022-25636)

Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano
Giuffrida discovered that hardware mitigations added by ARM to their
processors to address Spectre-BTI were insufficient. A local attacker could
potentially use this to expose sensitive information. (CVE-2022-23960)

Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano
Giuffrida discovered that hardware mitigations added by Intel to their
processors to address Spectre-BTI were insufficient. A local attacker could
potentially use this to expose sensitive information. (CVE-2022-0001,
CVE-2022-0002)


Update instructions

IMPORTANT: As part of this update, unprivileged eBPF is being disabled by default, as it is the primary known means of exploiting the Branch History Injection issues described above. It should be noted that other mechanisms for exploiting the underlying issues may be discovered. Also, this may cause issues for applications that rely on the unprivileged eBPF functionality. Please see the knowledge base article at https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI for more details. After a standard system update you need to reboot your computer to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.04 focal linux-image-5.4.0-1058-kvm –  5.4.0-1058.61
linux-image-gkeop –  5.4.0.1036.39
linux-image-virtual –  5.4.0.104.108
linux-image-5.4.0-1072-azure –  5.4.0-1072.75
linux-image-generic –  5.4.0.104.108
linux-image-oem –  5.4.0.104.108
linux-image-5.4.0-1030-bluefield –  5.4.0-1030.33
linux-image-bluefield –  5.4.0.1030.31
linux-image-gke-5.4 –  5.4.0.1065.75
linux-image-azure-lts-20.04 –  5.4.0.1072.70
linux-image-gkeop-5.4 –  5.4.0.1036.39
linux-image-azure-fde –  5.4.0.1072.75+cvm1.18
linux-image-5.4.0-1072-azure-fde –  5.4.0-1072.75+cvm1.1
linux-image-5.4.0-104-generic –  5.4.0-104.118
linux-image-5.4.0-1036-gkeop –  5.4.0-1036.37
linux-image-5.4.0-1066-oracle –  5.4.0-1066.71
linux-image-5.4.0-1068-aws –  5.4.0-1068.72
linux-image-lowlatency –  5.4.0.104.108
linux-image-gcp-lts-20.04 –  5.4.0.1067.76
linux-image-ibm-lts-20.04 –  5.4.0.1017.17
linux-image-ibm –  5.4.0.1017.17
linux-image-5.4.0-104-generic-lpae –  5.4.0-104.118
linux-image-aws-lts-20.04 –  5.4.0.1068.70
linux-image-5.4.0-1067-gcp –  5.4.0-1067.71
linux-image-raspi2 –  5.4.0.1055.89
linux-image-5.4.0-1055-raspi –  5.4.0-1055.62
linux-image-5.4.0-104-lowlatency –  5.4.0-104.118
linux-image-5.4.0-1017-ibm –  5.4.0-1017.19
linux-image-oem-osp1 –  5.4.0.104.108
linux-image-oracle-lts-20.04 –  5.4.0.1066.66
linux-image-raspi –  5.4.0.1055.89
linux-image-gke –  5.4.0.1065.75
linux-image-kvm –  5.4.0.1058.57
linux-image-5.4.0-1065-gke –  5.4.0-1065.68
linux-image-generic-lpae –  5.4.0.104.108
18.04 bionic linux-image-5.4.0-1072-azure –  5.4.0-1072.75~18.04.1
linux-image-generic-hwe-18.04 –  5.4.0.104.118~18.04.89
linux-image-snapdragon-hwe-18.04 –  5.4.0.104.118~18.04.89
linux-image-oem –  5.4.0.104.118~18.04.89
linux-image-aws –  5.4.0.1068.50
linux-image-raspi-hwe-18.04 –  5.4.0.1055.57
linux-image-ibm –  5.4.0.1017.34
linux-image-oem-osp1 –  5.4.0.104.118~18.04.89
linux-image-gke-5.4 –  5.4.0.1065.68~18.04.29
linux-image-generic-lpae-hwe-18.04 –  5.4.0.104.118~18.04.89
linux-image-5.4.0-104-lowlatency –  5.4.0-104.118~18.04.1
linux-image-5.4.0-1066-oracle –  5.4.0-1066.71~18.04.1
linux-image-gkeop-5.4 –  5.4.0.1036.37~18.04.36
linux-image-azure –  5.4.0.1072.51
linux-image-5.4.0-104-generic –  5.4.0-104.118~18.04.1
linux-image-5.4.0-1036-gkeop –  5.4.0-1036.37~18.04.1
linux-image-5.4.0-1068-aws –  5.4.0-1068.72~18.04.1
linux-image-5.4.0-104-generic-lpae –  5.4.0-104.118~18.04.1
linux-image-5.4.0-1067-gcp –  5.4.0-1067.71~18.04.1
linux-image-5.4.0-1055-raspi –  5.4.0-1055.62~18.04.1
linux-image-gcp –  5.4.0.1067.52
linux-image-5.4.0-1017-ibm –  5.4.0-1017.19~18.04.1
linux-image-oracle –  5.4.0.1066.71~18.04.45
linux-image-virtual-hwe-18.04 –  5.4.0.104.118~18.04.89
linux-image-lowlatency-hwe-18.04 –  5.4.0.104.118~18.04.89
linux-image-5.4.0-1065-gke –  5.4.0-1065.68~18.04.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›