[USN-5832-1] Linux kernel (Raspberry Pi) vulnerabilities
Several security issues were fixed in the Linux kernel.
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
- ID
- USN-5832-1
- Severity
- high
- Severity from
- CVE-2022-42896
- URL
- https://ubuntu.com/security/notices/USN-5832-1
- Published
-
2023-01-30T22:12:46
(19 months ago) - Modified
-
2023-01-30T22:12:46
(19 months ago) - Other Advisories
-
- ALAS-2023-1706
- ALAS2-2022-1903
- ALAS2-2023-1932
- ALSA-2023:0951
- ALSA-2023:1566
- ALSA-2023:2458
- ALSA-2023:4517
- ALSA-2024:3138
- DSA-5324-1
- ELSA-2022-10071
- ELSA-2022-10072
- ELSA-2022-10073
- ELSA-2022-10078
- ELSA-2022-10079
- ELSA-2022-10080
- ELSA-2022-10081
- ELSA-2022-10108
- ELSA-2023-0951
- ELSA-2023-1091
- ELSA-2023-12006
- ELSA-2023-12007
- ELSA-2023-12008
- ELSA-2023-12009
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-12109
- ELSA-2023-12117
- ELSA-2023-12118
- ELSA-2023-12119
- ELSA-2023-12121
- ELSA-2023-12160
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-1566
- ELSA-2023-1822
- ELSA-2023-2458
- ELSA-2023-4517
- ELSA-2024-1249
- ELSA-2024-2394
- ELSA-2024-3138
- FEDORA-2022-90162a1d88
- MS:CVE-2022-4378
- MS:CVE-2022-45934
- RHSA-2023:0951
- RHSA-2023:0979
- RHSA-2023:1008
- RHSA-2023:1091
- RHSA-2023:1092
- RHSA-2023:1101
- RHSA-2023:1566
- RHSA-2023:1584
- RHSA-2023:1659
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:4517
- RHSA-2023:4531
- RHSA-2023:4541
- RHSA-2024:1249
- RHSA-2024:1323
- RHSA-2024:1332
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2023:1566
- RLSA-2023:4517
- RLSA-2024:3138
- SSA:2022-333-01
- SSA:2023-048-01
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4510-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0134-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0420-1
- USN-5780-1
- USN-5783-1
- USN-5794-1
- USN-5799-1
- USN-5802-1
- USN-5803-1
- USN-5804-1
- USN-5804-2
- USN-5808-1
- USN-5809-1
- USN-5813-1
- USN-5814-1
- USN-5829-1
- USN-5830-1
- USN-5831-1
- USN-5858-1
- USN-5860-1
- USN-5861-1
- USN-5863-1
- USN-5875-1
- USN-5877-1
- USN-5879-1
- USN-5883-1
- USN-5914-1
- USN-5918-1
- USN-5919-1
- USN-5920-1
- XSA-423
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-raspi?distro=kinetic | ubuntu | linux-tools-raspi | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-tools-raspi-nolpae?distro=kinetic | ubuntu | linux-tools-raspi-nolpae | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-tools-5.19.0-1012-raspi?distro=kinetic | ubuntu | linux-tools-5.19.0-1012-raspi | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-tools-5.19.0-1012-raspi-nolpae?distro=kinetic | ubuntu | linux-tools-5.19.0-1012-raspi-nolpae | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-raspi?distro=kinetic | ubuntu | linux-raspi | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-raspi-tools-5.19.0-1012?distro=kinetic | ubuntu | linux-raspi-tools-5.19.0-1012 | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-raspi-nolpae?distro=kinetic | ubuntu | linux-raspi-nolpae | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-raspi-headers-5.19.0-1012?distro=kinetic | ubuntu | linux-raspi-headers-5.19.0-1012 | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-raspi?distro=kinetic | ubuntu | linux-modules-extra-raspi | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-raspi-nolpae?distro=kinetic | ubuntu | linux-modules-extra-raspi-nolpae | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.19.0-1012-raspi?distro=kinetic | ubuntu | linux-modules-extra-5.19.0-1012-raspi | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.19.0-1012-raspi-nolpae?distro=kinetic | ubuntu | linux-modules-extra-5.19.0-1012-raspi-nolpae | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-modules-5.19.0-1012-raspi?distro=kinetic | ubuntu | linux-modules-5.19.0-1012-raspi | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-modules-5.19.0-1012-raspi-nolpae?distro=kinetic | ubuntu | linux-modules-5.19.0-1012-raspi-nolpae | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-image-raspi?distro=kinetic | ubuntu | linux-image-raspi | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-image-raspi-nolpae?distro=kinetic | ubuntu | linux-image-raspi-nolpae | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-image-5.19.0-1012-raspi?distro=kinetic | ubuntu | linux-image-5.19.0-1012-raspi | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-image-5.19.0-1012-raspi-nolpae?distro=kinetic | ubuntu | linux-image-5.19.0-1012-raspi-nolpae | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-headers-raspi?distro=kinetic | ubuntu | linux-headers-raspi | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-headers-raspi-nolpae?distro=kinetic | ubuntu | linux-headers-raspi-nolpae | < 5.19.0.1012.11 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-headers-5.19.0-1012-raspi?distro=kinetic | ubuntu | linux-headers-5.19.0-1012-raspi | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-headers-5.19.0-1012-raspi-nolpae?distro=kinetic | ubuntu | linux-headers-5.19.0-1012-raspi-nolpae | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.19.0-1012-raspi?distro=kinetic | ubuntu | linux-buildinfo-5.19.0-1012-raspi | < 5.19.0-1012.19 | kinetic | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.19.0-1012-raspi-nolpae?distro=kinetic | ubuntu | linux-buildinfo-5.19.0-1012-raspi-nolpae | < 5.19.0-1012.19 | kinetic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |