{"id":"USN-5297-1","summary":"linux-gke, linux-gke-5.4 vulnerabilities","details":"Szymon Heidrich discovered that the USB Gadget subsystem in the Linux\nkernel did not properly restrict the size of control requests for certain\ngadget types, leading to possible out of bounds reads or writes. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2021-39685)\n\nJann Horn discovered a race condition in the Unix domain socket\nimplementation in the Linux kernel that could result in a read-after-free.\nA local attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2021-4083)\n\nKirill Tkhai discovered that the XFS file system implementation in the\nLinux kernel did not calculate size correctly when pre-allocating space in\nsome situations. A local attacker could use this to expose sensitive\ninformation. (CVE-2021-4155)\n\nLin Ma discovered that the NFC Controller Interface (NCI) implementation in\nthe Linux kernel contained a race condition, leading to a use-after-free\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2021-4202)\n\nBrendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device\ndriver in the Linux kernel did not properly validate meta-data coming from\nthe device. A local attacker who can control an emulated device can use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2021-43975)\n\nSushma Venkatesh Reddy discovered that the Intel i915 graphics driver in\nthe Linux kernel did not perform a GPU TLB flush in some situations. A\nlocal attacker could use this to cause a denial of service or possibly\nexecute arbitrary code. (CVE-2022-0330)\n\nIt was discovered that the VMware Virtual GPU driver in the Linux kernel\ndid not properly handle certain failure conditions, leading to a stale\nentry in the file descriptor table. A local attacker could use this to\nexpose sensitive information or possibly gain administrative privileges.\n(CVE-2022-22942)\n","modified":"2026-02-04T03:43:15.102714Z","published":"2022-02-22T07:43:22Z","related":["UBUNTU-CVE-2021-39685","UBUNTU-CVE-2021-4083","UBUNTU-CVE-2021-4155","UBUNTU-CVE-2021-4202","UBUNTU-CVE-2021-43975","UBUNTU-CVE-2022-0330","UBUNTU-CVE-2022-22942"],"upstream":["CVE-2021-39685","CVE-2021-4083","CVE-2021-4155","CVE-2021-4202","CVE-2021-43975","CVE-2022-0330","CVE-2022-22942","UBUNTU-CVE-2021-39685","UBUNTU-CVE-2021-4083","UBUNTU-CVE-2021-4155","UBUNTU-CVE-2021-4202","UBUNTU-CVE-2021-43975","UBUNTU-CVE-2022-0330","UBUNTU-CVE-2022-22942"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5297-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4083"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4155"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4202"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-39685"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-43975"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0330"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22942"}],"affected":[{"package":{"name":"linux-gke-5.4","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gke-5.4@5.4.0-1063.66~18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1063.66~18.04.1"}]}],"versions":["5.4.0-1025.25~18.04.1","5.4.0-1027.28~18.04.1","5.4.0-1029.31~18.04.1","5.4.0-1030.32~18.04.1","5.4.0-1032.34~18.04.1","5.4.0-1033.35~18.04.1","5.4.0-1035.37~18.04.1","5.4.0-1036.38~18.04.1","5.4.0-1037.39~18.04.1","5.4.0-1039.41~18.04.1","5.4.0-1040.42~18.04.1","5.4.0-1042.44~18.04.1","5.4.0-1043.45~18.04.1","5.4.0-1044.46~18.04.1","5.4.0-1046.48~18.04.1","5.4.0-1049.52~18.04.1","5.4.0-1051.54~18.04.1","5.4.0-1052.55~18.04.1","5.4.0-1053.56~18.04.1","5.4.0-1054.57~18.04.1","5.4.0-1055.58~18.04.1","5.4.0-1056.59~18.04.1","5.4.0-1057.60~18.04.1","5.4.0-1059.62~18.04.1","5.4.0-1061.64~18.04.1","5.4.0-1062.65~18.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.4.0-1063.66~18.04.1","binary_name":"linux-buildinfo-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66~18.04.1","binary_name":"linux-gke-5.4-headers-5.4.0-1063"},{"binary_version":"5.4.0-1063.66~18.04.1","binary_name":"linux-gke-5.4-tools-5.4.0-1063"},{"binary_version":"5.4.0-1063.66~18.04.1","binary_name":"linux-headers-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66~18.04.1","binary_name":"linux-image-unsigned-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66~18.04.1","binary_name":"linux-modules-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66~18.04.1","binary_name":"linux-modules-extra-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66~18.04.1","binary_name":"linux-tools-5.4.0-1063-gke"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-4083"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-4155"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-4202"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-39685"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-43975"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-0330"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-22942"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5297-1.json"}},{"package":{"name":"linux-gke","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gke@5.4.0-1063.66?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-1063.66"}]}],"versions":["5.4.0-1033.35","5.4.0-1035.37","5.4.0-1036.38","5.4.0-1037.39","5.4.0-1039.41","5.4.0-1041.43","5.4.0-1042.44","5.4.0-1043.45","5.4.0-1044.46","5.4.0-1046.48","5.4.0-1049.52","5.4.0-1051.54","5.4.0-1052.55","5.4.0-1053.56","5.4.0-1054.57","5.4.0-1055.58","5.4.0-1056.59","5.4.0-1057.60","5.4.0-1059.62","5.4.0-1061.64","5.4.0-1062.65"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.4.0-1063.66","binary_name":"linux-buildinfo-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66","binary_name":"linux-gke-headers-5.4.0-1063"},{"binary_version":"5.4.0-1063.66","binary_name":"linux-gke-tools-5.4.0-1063"},{"binary_version":"5.4.0-1063.66","binary_name":"linux-headers-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66","binary_name":"linux-image-unsigned-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66","binary_name":"linux-modules-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66","binary_name":"linux-modules-extra-5.4.0-1063-gke"},{"binary_version":"5.4.0-1063.66","binary_name":"linux-tools-5.4.0-1063-gke"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-4083"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-4155"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-4202"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-39685"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-43975"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-0330"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-22942"}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5297-1.json"}}],"schema_version":"1.7.3"}