[USN-5794-1] Linux kernel (AWS) vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
- ID
- USN-5794-1
- Severity
- high
- Severity from
- CVE-2022-42896
- URL
- https://ubuntu.com/security/notices/USN-5794-1
- Published
-
2023-01-06T22:55:54
(20 months ago) - Modified
-
2023-01-06T22:55:54
(20 months ago) - Other Advisories
-
- ALAS-2023-1706
- ALAS2-2022-1903
- ALAS2-2023-1932
- ALSA-2023:0334
- ALSA-2023:0832
- ALSA-2023:2458
- ALSA-2023:4517
- ALSA-2024:3138
- DSA-5324-1
- DSA-5730-1
- ELSA-2023-0334
- ELSA-2023-0832
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-12109
- ELSA-2023-12117
- ELSA-2023-12118
- ELSA-2023-12119
- ELSA-2023-12121
- ELSA-2023-12160
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-2458
- ELSA-2023-4517
- ELSA-2024-1249
- ELSA-2024-2394
- ELSA-2024-3138
- FEDORA-2022-90162a1d88
- MS:CVE-2022-43945
- MS:CVE-2022-45934
- RHSA-2023:0300
- RHSA-2023:0334
- RHSA-2023:0348
- RHSA-2023:0832
- RHSA-2023:0839
- RHSA-2023:0854
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:4517
- RHSA-2023:4531
- RHSA-2023:4541
- RHSA-2024:1249
- RHSA-2024:1323
- RHSA-2024:1332
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2023:0334
- RLSA-2023:0832
- RLSA-2023:4517
- RLSA-2024:3138
- SSA:2022-333-01
- SSA:2023-048-01
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4510-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0134-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2151-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2232-1
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5773-1
- USN-5779-1
- USN-5780-1
- USN-5783-1
- USN-5789-1
- USN-5802-1
- USN-5803-1
- USN-5804-1
- USN-5804-2
- USN-5808-1
- USN-5809-1
- USN-5813-1
- USN-5814-1
- USN-5829-1
- USN-5830-1
- USN-5831-1
- USN-5832-1
- USN-5858-1
- USN-5860-1
- USN-5861-1
- USN-5863-1
- USN-5875-1
- USN-5877-1
- USN-5879-1
- USN-5914-1
- USN-5918-1
- XSA-423
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-aws?distro=xenial | ubuntu | linux-tools-aws | < 4.4.0.1153.157 | xenial | ||
Affected | pkg:deb/ubuntu/linux-tools-4.4.0-1153-aws?distro=xenial | ubuntu | linux-tools-4.4.0-1153-aws | < 4.4.0-1153.168 | xenial | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-aws?distro=xenial | ubuntu | linux-modules-extra-aws | < 4.4.0.1153.157 | xenial | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-4.4.0-1153-aws?distro=xenial | ubuntu | linux-modules-extra-4.4.0-1153-aws | < 4.4.0-1153.168 | xenial | ||
Affected | pkg:deb/ubuntu/linux-modules-4.4.0-1153-aws?distro=xenial | ubuntu | linux-modules-4.4.0-1153-aws | < 4.4.0-1153.168 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=xenial | ubuntu | linux-image-aws | < 4.4.0.1153.157 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1153-aws?distro=xenial | ubuntu | linux-image-4.4.0-1153-aws | < 4.4.0-1153.168 | xenial | ||
Affected | pkg:deb/ubuntu/linux-headers-aws?distro=xenial | ubuntu | linux-headers-aws | < 4.4.0.1153.157 | xenial | ||
Affected | pkg:deb/ubuntu/linux-headers-4.4.0-1153-aws?distro=xenial | ubuntu | linux-headers-4.4.0-1153-aws | < 4.4.0-1153.168 | xenial | ||
Affected | pkg:deb/ubuntu/linux-cloud-tools-4.4.0-1153-aws?distro=xenial | ubuntu | linux-cloud-tools-4.4.0-1153-aws | < 4.4.0-1153.168 | xenial | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-4.4.0-1153-aws?distro=xenial | ubuntu | linux-buildinfo-4.4.0-1153-aws | < 4.4.0-1153.168 | xenial | ||
Affected | pkg:deb/ubuntu/linux-aws?distro=xenial | ubuntu | linux-aws | < 4.4.0.1153.157 | xenial | ||
Affected | pkg:deb/ubuntu/linux-aws-tools-4.4.0-1153?distro=xenial | ubuntu | linux-aws-tools-4.4.0-1153 | < 4.4.0-1153.168 | xenial | ||
Affected | pkg:deb/ubuntu/linux-aws-headers-4.4.0-1153?distro=xenial | ubuntu | linux-aws-headers-4.4.0-1153 | < 4.4.0-1153.168 | xenial | ||
Affected | pkg:deb/ubuntu/linux-aws-cloud-tools-4.4.0-1153?distro=xenial | ubuntu | linux-aws-cloud-tools-4.4.0-1153 | < 4.4.0-1153.168 | xenial |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |