CVE-2022-1972

Publication date 2 June 2022

Last updated 24 July 2024


Ubuntu priority

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

From the Ubuntu Security Team

Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. A local attacker could use this to cause a denial of service or execute arbitrary code.

Mitigation

If not needed, disable the ability for unprivileged users to create namespaces: $ sudo sysctl -w kernel.unprivileged_userns_clone=0 $ echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
linux

References

Related Ubuntu Security Notices (USN)

    • USN-5468-1
    • Linux kernel vulnerabilities
    • 8 June 2022
    • USN-5469-1
    • Linux kernel vulnerabilities
    • 8 June 2022
    • USN-5470-1
    • Linux kernel (OEM) vulnerabilities
    • 8 June 2022
    • USN-5471-1
    • Linux kernel (OEM) vulnerabilities
    • 8 June 2022
    • LSN-0087-1
    • Kernel Live Patch Security Notice
    • 16 June 2022
    • LSN-0089-1
    • Kernel Live Patch Security Notice
    • 24 August 2022

Other references