Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | linux-image-oem-22.04 | <Â 5.17.0.1006.6 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-headers-oem-22.04 | <Â 5.17.0.1006.6 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-headers-oem-22.04a | <Â 5.17.0.1006.6 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-oem-22.04a | <Â 5.17.0.1006.6 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-oem-22.04 | <Â 5.17.0.1006.6 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-oem-22.04a | <Â 5.17.0.1006.6 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-tools-oem-22.04 | <Â 5.17.0.1006.6 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-tools-oem-22.04a | <Â 5.17.0.1006.6 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-5.17.0-1006-oem | <Â 5.17.0-1006.6 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-5.17.0-1006-oem-dbgsym | <Â 5.17.0-1006.6 | UNKNOWN |