Severity
High
Vendor
Canonical Ubuntu
Versions Affected
Description
It was discovered that the network traffic control implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1055) It was discovered that the IPsec implementation in the Linux kernel did not properly allocate enough memory when performing ESP transformations, leading to a heap-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-27666)
CVEs contained in this USN include: CVE-2022-27666, CVE-2022-1055.
Affected Cloud Foundry Products and Versions
Severity is high unless otherwise noted.
Mitigation
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
References
History
2022-04-14: Initial vulnerability report published.