[USN-5727-2] Linux kernel (GCP) vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that a race condition existed in the instruction emulator
of the Linux kernel on Arm 64-bit systems. A local attacker could use this
to cause a denial of service (system crash). (CVE-2022-20422)
It was discovered that the KVM implementation in the Linux kernel did not
properly handle virtual CPUs without APICs in certain situations. A local
attacker could possibly use this to cause a denial of service (host system
crash). (CVE-2022-2153)
Hao Sun and Jiacheng Xu discovered that the NILFS file system
implementation in the Linux kernel contained a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-2978)
Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2022-3028)
It was discovered that the IDT 77252 ATM PCI device driver in the Linux
kernel did not properly remove any pending timers during device exit,
resulting in a use-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-3635)
It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)
Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX
storage controller driver in the Linux kernel did not properly handle
certain structures. A local attacker could potentially use this to expose
sensitive information (kernel memory). (CVE-2022-40768)
- ID
- USN-5727-2
- Severity
- high
- Severity from
- CVE-2022-2978
- URL
- https://ubuntu.com/security/notices/USN-5727-2
- Published
-
2022-11-18T20:47:25
(22 months ago) - Modified
-
2022-11-18T20:47:25
(22 months ago) - Other Advisories
-
- ALAS-2022-1636
- ALAS-2022-1645
- ALAS2-2022-1833
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALAS2-2022-1876
- ALSA-2023:2458
- ALSA-2023:2951
- ASB-A-237540956
- DSA-5173-1
- DSA-5207-1
- ELSA-2022-10065
- ELSA-2022-10072
- ELSA-2022-10073
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2022-9852
- ELSA-2022-9870
- ELSA-2022-9871
- ELSA-2022-9926
- ELSA-2022-9927
- ELSA-2022-9930
- ELSA-2022-9931
- ELSA-2022-9998
- ELSA-2022-9999
- ELSA-2023-2458
- ELSA-2023-2951
- FEDORA-2022-1a5b125ac6
- FEDORA-2022-2cfbe17910
- FEDORA-2022-35c14ba5bb
- FEDORA-2022-6835ddb6d8
- FEDORA-2022-b948fc3cfb
- FEDORA-2022-ccb0138bb6
- MS:CVE-2022-2153
- MS:CVE-2022-3028
- MS:CVE-2022-36879
- MS:CVE-2022-40768
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- SSA:2022-237-02
- SSA:2022-333-01
- SUSE-SU-2022:3263-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3775-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3810-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-5650-1
- USN-5667-1
- USN-5668-1
- USN-5677-1
- USN-5682-1
- USN-5683-1
- USN-5693-1
- USN-5703-1
- USN-5706-1
- USN-5727-1
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5729-1
- USN-5729-2
- USN-5758-1
- USN-5774-1
- USN-5913-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
- USN-6247-1
- USN-6739-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-gke?distro=xenial | ubuntu | linux-tools-gke | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-tools-gcp?distro=xenial | ubuntu | linux-tools-gcp | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-tools-gcp-lts-18.04?distro=bionic | ubuntu | linux-tools-gcp-lts-18.04 | < 4.15.0.1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-tools-4.15.0-1138-gcp?distro=xenial | ubuntu | linux-tools-4.15.0-1138-gcp | < 4.15.0-1138.154~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-tools-4.15.0-1138-gcp?distro=bionic | ubuntu | linux-tools-4.15.0-1138-gcp | < 4.15.0-1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-gke?distro=xenial | ubuntu | linux-modules-extra-gke | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-gcp?distro=xenial | ubuntu | linux-modules-extra-gcp | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-gcp-lts-18.04?distro=bionic | ubuntu | linux-modules-extra-gcp-lts-18.04 | < 4.15.0.1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-4.15.0-1138-gcp?distro=xenial | ubuntu | linux-modules-extra-4.15.0-1138-gcp | < 4.15.0-1138.154~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-4.15.0-1138-gcp?distro=bionic | ubuntu | linux-modules-extra-4.15.0-1138-gcp | < 4.15.0-1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-modules-4.15.0-1138-gcp?distro=xenial | ubuntu | linux-modules-4.15.0-1138-gcp | < 4.15.0-1138.154~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-modules-4.15.0-1138-gcp?distro=bionic | ubuntu | linux-modules-4.15.0-1138-gcp | < 4.15.0-1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-4.15.0-1138-gcp?distro=xenial | ubuntu | linux-image-unsigned-4.15.0-1138-gcp | < 4.15.0-1138.154~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-4.15.0-1138-gcp?distro=bionic | ubuntu | linux-image-unsigned-4.15.0-1138-gcp | < 4.15.0-1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-gke?distro=xenial | ubuntu | linux-image-gke | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-gcp?distro=xenial | ubuntu | linux-image-gcp | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-gcp-lts-18.04?distro=bionic | ubuntu | linux-image-gcp-lts-18.04 | < 4.15.0.1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1138-gcp?distro=xenial | ubuntu | linux-image-4.15.0-1138-gcp | < 4.15.0-1138.154~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.15.0-1138-gcp?distro=bionic | ubuntu | linux-image-4.15.0-1138-gcp | < 4.15.0-1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-headers-gke?distro=xenial | ubuntu | linux-headers-gke | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-headers-gcp?distro=xenial | ubuntu | linux-headers-gcp | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-headers-gcp-lts-18.04?distro=bionic | ubuntu | linux-headers-gcp-lts-18.04 | < 4.15.0.1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-headers-4.15.0-1138-gcp?distro=xenial | ubuntu | linux-headers-4.15.0-1138-gcp | < 4.15.0-1138.154~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-headers-4.15.0-1138-gcp?distro=bionic | ubuntu | linux-headers-4.15.0-1138-gcp | < 4.15.0-1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-gke?distro=xenial | ubuntu | linux-gke | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-gcp?distro=xenial | ubuntu | linux-gcp | < 4.15.0.1138.132 | xenial | ||
Affected | pkg:deb/ubuntu/linux-gcp-tools-4.15.0-1138?distro=xenial | ubuntu | linux-gcp-tools-4.15.0-1138 | < 4.15.0-1138.154~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-gcp-lts-18.04?distro=bionic | ubuntu | linux-gcp-lts-18.04 | < 4.15.0.1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-gcp-headers-4.15.0-1138?distro=xenial | ubuntu | linux-gcp-headers-4.15.0-1138 | < 4.15.0-1138.154~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-gcp-4.15-tools-4.15.0-1138?distro=bionic | ubuntu | linux-gcp-4.15-tools-4.15.0-1138 | < 4.15.0-1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-gcp-4.15-headers-4.15.0-1138?distro=bionic | ubuntu | linux-gcp-4.15-headers-4.15.0-1138 | < 4.15.0-1138.154 | bionic | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-4.15.0-1138-gcp?distro=xenial | ubuntu | linux-buildinfo-4.15.0-1138-gcp | < 4.15.0-1138.154~16.04.1 | xenial | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-4.15.0-1138-gcp?distro=bionic | ubuntu | linux-buildinfo-4.15.0-1138-gcp | < 4.15.0-1138.154 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |