[USN-5877-1] Linux kernel (GKE) vulnerabilities
Several security issues were fixed in the Linux kernel.
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
Mingwei Zhang discovered that the KVM implementation for AMD processors in
the Linux kernel did not properly handle cache coherency with Secure
Encrypted Virtualization (SEV). A local attacker could possibly use this to
cause a denial of service (host system crash). (CVE-2022-0171)
It was discovered that a race condition existed in the Android Binder IPC
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-20421)
David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)
It was discovered that the Intel 740 frame buffer driver in the Linux
kernel contained a divide by zero vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3061)
It was discovered that the sound subsystem in the Linux kernel contained a
race condition in some situations. A local attacker could use this to cause
a denial of service (system crash). (CVE-2022-3303)
It was discovered that a memory leak existed in the Unix domain socket
implementation of the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2022-3543)
Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)
It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)
It was discovered that the hugetlb implementation in the Linux kernel
contained a race condition in some situations. A local attacker could use
this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2022-3623)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)
Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)
Jann Horn discovered a race condition existed in the Linux kernel when
unmapping VMAs in certain situations, resulting in possible use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-39188)
Hyunwoo Kim discovered that an integer overflow vulnerability existed in
the PXA3xx graphics driver in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2022-39842)
It was discovered that a race condition existed in the EFI capsule loader
driver in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-40307)
Zheng Wang and Zhuorao Yang discovered that the RealTek RTL8712U wireless
driver in the Linux kernel contained a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-4095)
It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)
It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
It was discovered that the USB core subsystem in the Linux kernel did not
properly handle nested reset events. A local attacker with physical access
could plug in a specially crafted USB device to cause a denial of service
(kernel deadlock). (CVE-2022-4662)
Arnaud Gatignol, Quentin Minster, Florent Saudel and Guillaume Teissier
discovered that the KSMBD implementation in the Linux kernel did not
properly validate user-supplied data in some situations. An authenticated
attacker could use this to cause a denial of service (system crash), expose
sensitive information (kernel memory) or possibly execute arbitrary code.
(CVE-2022-47940)
It was discovered that a race condition existed in the qdisc implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0590)
- ID
- USN-5877-1
- Severity
- high
- Severity from
- CVE-2022-3640
- URL
- https://ubuntu.com/security/notices/USN-5877-1
- Published
-
2023-02-15T23:05:01
(19 months ago) - Modified
-
2023-02-15T23:05:01
(19 months ago) - Other Advisories
-
- ALAS-2022-1636
- ALAS-2022-1645
- ALAS-2023-1706
- ALAS-2024-1899
- ALAS2-2022-1852
- ALAS2-2022-1876
- ALAS2-2022-1888
- ALAS2-2022-1903
- ALAS2-2023-1932
- ALAS2-2024-2391
- ALSA-2023:0951
- ALSA-2023:1566
- ALSA-2023:2458
- ALSA-2023:2951
- ALSA-2023:4517
- ALSA-2023:7077
- ALSA-2024:3138
- DSA-5257-1
- DSA-5324-1
- ELSA-2022-10065
- ELSA-2022-10071
- ELSA-2022-10072
- ELSA-2022-10073
- ELSA-2022-10078
- ELSA-2022-10079
- ELSA-2022-10080
- ELSA-2022-10081
- ELSA-2022-10108
- ELSA-2023-0951
- ELSA-2023-1091
- ELSA-2023-12006
- ELSA-2023-12007
- ELSA-2023-12008
- ELSA-2023-12009
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-12109
- ELSA-2023-12117
- ELSA-2023-12118
- ELSA-2023-12119
- ELSA-2023-12121
- ELSA-2023-12160
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-12323
- ELSA-2023-1566
- ELSA-2023-1822
- ELSA-2023-1987
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2023-4517
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2024-12150
- ELSA-2024-1249
- ELSA-2024-2394
- ELSA-2024-3138
- FEDORA-2022-64ab9153c0
- FEDORA-2022-65a0a3504a
- FEDORA-2022-7aadaadebc
- FEDORA-2022-90162a1d88
- MS:CVE-2022-0171
- MS:CVE-2022-3303
- MS:CVE-2022-3543
- MS:CVE-2022-3586
- MS:CVE-2022-39188
- MS:CVE-2022-39842
- MS:CVE-2022-40307
- MS:CVE-2022-41849
- MS:CVE-2022-41850
- MS:CVE-2022-43750
- MS:CVE-2022-4378
- MS:CVE-2022-45934
- MS:CVE-2022-4662
- MS:CVE-2022-47940
- RHSA-2023:0951
- RHSA-2023:0979
- RHSA-2023:1008
- RHSA-2023:1091
- RHSA-2023:1092
- RHSA-2023:1101
- RHSA-2023:1566
- RHSA-2023:1584
- RHSA-2023:1659
- RHSA-2023:1987
- RHSA-2023:1988
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:4517
- RHSA-2023:4531
- RHSA-2023:4541
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2024:1249
- RHSA-2024:1323
- RHSA-2024:1332
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2023:1566
- RLSA-2023:4517
- RLSA-2024:3138
- SSA:2022-333-01
- SSA:2023-048-01
- SUSE-SU-2022:3263-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3342-1
- SUSE-SU-2022:3346-1
- SUSE-SU-2022:3350-1
- SUSE-SU-2022:3359-1
- SUSE-SU-2022:3360-1
- SUSE-SU-2022:3362-1
- SUSE-SU-2022:3366-1
- SUSE-SU-2022:3368-1
- SUSE-SU-2022:3369-1
- SUSE-SU-2022:3370-1
- SUSE-SU-2022:3372-1
- SUSE-SU-2022:3373-1
- SUSE-SU-2022:3377-1
- SUSE-SU-2022:3379-1
- SUSE-SU-2022:3406-1
- SUSE-SU-2022:3407-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3409-1
- SUSE-SU-2022:3412-1
- SUSE-SU-2022:3415-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3424-1
- SUSE-SU-2022:3432-1
- SUSE-SU-2022:3433-1
- SUSE-SU-2022:3445-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3463-1
- SUSE-SU-2022:3464-1
- SUSE-SU-2022:3465-1
- SUSE-SU-2022:3476-1
- SUSE-SU-2022:3584-1
- SUSE-SU-2022:3585-1
- SUSE-SU-2022:3586-1
- SUSE-SU-2022:3587-1
- SUSE-SU-2022:3599-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3688-1
- SUSE-SU-2022:3693-1
- SUSE-SU-2022:3704-1
- SUSE-SU-2022:3775-1
- SUSE-SU-2022:3779-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3810-1
- SUSE-SU-2022:3844-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4510-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0134-1
- SUSE-SU-2023:0145-1
- SUSE-SU-2023:0146-1
- SUSE-SU-2023:0147-1
- SUSE-SU-2023:0148-1
- SUSE-SU-2023:0149-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0407-1
- SUSE-SU-2023:0410-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0485-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0634-1
- SUSE-SU-2023:0767-1
- SUSE-SU-2023:0768-1
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:0778-1
- SUSE-SU-2023:0779-1
- SUSE-SU-2023:0780-1
- SUSE-SU-2023:0852-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:1971-1
- SUSE-SU-2023:1973-1
- SUSE-SU-2023:1975-1
- SUSE-SU-2023:1982-1
- SUSE-SU-2023:1983-1
- SUSE-SU-2023:1995-1
- SUSE-SU-2023:2007-1
- SUSE-SU-2023:2009-1
- SUSE-SU-2023:2023-1
- SUSE-SU-2023:2024-1
- SUSE-SU-2023:2031-1
- SUSE-SU-2023:2035-1
- SUSE-SU-2023:2043-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- USN-5758-1
- USN-5780-1
- USN-5783-1
- USN-5790-1
- USN-5791-1
- USN-5791-2
- USN-5791-3
- USN-5792-1
- USN-5792-2
- USN-5793-1
- USN-5793-2
- USN-5793-3
- USN-5793-4
- USN-5794-1
- USN-5799-1
- USN-5802-1
- USN-5803-1
- USN-5804-1
- USN-5804-2
- USN-5808-1
- USN-5809-1
- USN-5813-1
- USN-5814-1
- USN-5815-1
- USN-5829-1
- USN-5830-1
- USN-5831-1
- USN-5832-1
- USN-5850-1
- USN-5851-1
- USN-5853-1
- USN-5854-1
- USN-5858-1
- USN-5859-1
- USN-5860-1
- USN-5861-1
- USN-5862-1
- USN-5863-1
- USN-5865-1
- USN-5874-1
- USN-5875-1
- USN-5876-1
- USN-5878-1
- USN-5879-1
- USN-5883-1
- USN-5884-1
- USN-5909-1
- USN-5913-1
- USN-5914-1
- USN-5917-1
- USN-5918-1
- USN-5919-1
- USN-5920-1
- USN-5924-1
- USN-5925-1
- USN-5926-1
- USN-5927-1
- USN-5934-1
- USN-5939-1
- USN-5940-1
- USN-5951-1
- USN-5975-1
- USN-5976-1
- USN-6000-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-6031-1
- USN-6045-1
- USN-6071-1
- USN-6124-1
- USN-6247-1
- USN-6252-1
- USN-6284-1
- USN-6301-1
- USN-6312-1
- USN-6314-1
- USN-6331-1
- USN-6337-1
- XSA-423
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-tools-gke-edge?distro=focal | ubuntu | linux-tools-gke-edge | < 5.15.0.1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-gke-5.15?distro=focal | ubuntu | linux-tools-gke-5.15 | < 5.15.0.1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-tools-5.15.0-1027-gke?distro=focal | ubuntu | linux-tools-5.15.0-1027-gke | < 5.15.0-1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-iwlwifi-5.15.0-1027-gke?distro=focal | ubuntu | linux-modules-iwlwifi-5.15.0-1027-gke | < 5.15.0-1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-extra-5.15.0-1027-gke?distro=focal | ubuntu | linux-modules-extra-5.15.0-1027-gke | < 5.15.0-1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-modules-5.15.0-1027-gke?distro=focal | ubuntu | linux-modules-5.15.0-1027-gke | < 5.15.0-1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-unsigned-5.15.0-1027-gke?distro=focal | ubuntu | linux-image-unsigned-5.15.0-1027-gke | < 5.15.0-1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-gke-edge?distro=focal | ubuntu | linux-image-gke-edge | < 5.15.0.1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-gke-5.15?distro=focal | ubuntu | linux-image-gke-5.15 | < 5.15.0.1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-image-5.15.0-1027-gke?distro=focal | ubuntu | linux-image-5.15.0-1027-gke | < 5.15.0-1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-gke-edge?distro=focal | ubuntu | linux-headers-gke-edge | < 5.15.0.1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-gke-5.15?distro=focal | ubuntu | linux-headers-gke-5.15 | < 5.15.0.1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-headers-5.15.0-1027-gke?distro=focal | ubuntu | linux-headers-5.15.0-1027-gke | < 5.15.0-1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gke-edge?distro=focal | ubuntu | linux-gke-edge | < 5.15.0.1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gke-5.15?distro=focal | ubuntu | linux-gke-5.15 | < 5.15.0.1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gke-5.15-tools-5.15.0-1027?distro=focal | ubuntu | linux-gke-5.15-tools-5.15.0-1027 | < 5.15.0-1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-gke-5.15-headers-5.15.0-1027?distro=focal | ubuntu | linux-gke-5.15-headers-5.15.0-1027 | < 5.15.0-1027.32~20.04.1 | focal | ||
Affected | pkg:deb/ubuntu/linux-buildinfo-5.15.0-1027-gke?distro=focal | ubuntu | linux-buildinfo-5.15.0-1027-gke | < 5.15.0-1027.32~20.04.1 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |