[USN-5884-1] Linux kernel (AWS) vulnerabilities

Severity High
Affected Packages 15
CVEs 6

Several security issues were fixed in the Linux kernel.

Kirill Tkhai discovered that the XFS file system implementation in the
Linux kernel did not calculate size correctly when pre-allocating space in
some situations. A local attacker could use this to expose sensitive
information. (CVE-2021-4155)

Lee Jones discovered that a use-after-free vulnerability existed in the
Bluetooth implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-20566)

Duoming Zhou discovered that a race condition existed in the SLIP driver in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to cause a denial of service (system crash).
(CVE-2022-41858)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)

ID
USN-5884-1
Severity
high
Severity from
CVE-2022-20566
URL
https://ubuntu.com/security/notices/USN-5884-1
Published
2023-02-23T16:09:52
(19 months ago)
Modified
2023-02-23T16:09:52
(19 months ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-tools-aws?distro=xenial ubuntu linux-tools-aws < 4.4.0.1154.158 xenial
Affected pkg:deb/ubuntu/linux-tools-4.4.0-1154-aws?distro=xenial ubuntu linux-tools-4.4.0-1154-aws < 4.4.0-1154.169 xenial
Affected pkg:deb/ubuntu/linux-modules-extra-aws?distro=xenial ubuntu linux-modules-extra-aws < 4.4.0.1154.158 xenial
Affected pkg:deb/ubuntu/linux-modules-extra-4.4.0-1154-aws?distro=xenial ubuntu linux-modules-extra-4.4.0-1154-aws < 4.4.0-1154.169 xenial
Affected pkg:deb/ubuntu/linux-modules-4.4.0-1154-aws?distro=xenial ubuntu linux-modules-4.4.0-1154-aws < 4.4.0-1154.169 xenial
Affected pkg:deb/ubuntu/linux-image-aws?distro=xenial ubuntu linux-image-aws < 4.4.0.1154.158 xenial
Affected pkg:deb/ubuntu/linux-image-4.4.0-1154-aws?distro=xenial ubuntu linux-image-4.4.0-1154-aws < 4.4.0-1154.169 xenial
Affected pkg:deb/ubuntu/linux-headers-aws?distro=xenial ubuntu linux-headers-aws < 4.4.0.1154.158 xenial
Affected pkg:deb/ubuntu/linux-headers-4.4.0-1154-aws?distro=xenial ubuntu linux-headers-4.4.0-1154-aws < 4.4.0-1154.169 xenial
Affected pkg:deb/ubuntu/linux-cloud-tools-4.4.0-1154-aws?distro=xenial ubuntu linux-cloud-tools-4.4.0-1154-aws < 4.4.0-1154.169 xenial
Affected pkg:deb/ubuntu/linux-buildinfo-4.4.0-1154-aws?distro=xenial ubuntu linux-buildinfo-4.4.0-1154-aws < 4.4.0-1154.169 xenial
Affected pkg:deb/ubuntu/linux-aws?distro=xenial ubuntu linux-aws < 4.4.0.1154.158 xenial
Affected pkg:deb/ubuntu/linux-aws-tools-4.4.0-1154?distro=xenial ubuntu linux-aws-tools-4.4.0-1154 < 4.4.0-1154.169 xenial
Affected pkg:deb/ubuntu/linux-aws-headers-4.4.0-1154?distro=xenial ubuntu linux-aws-headers-4.4.0-1154 < 4.4.0-1154.169 xenial
Affected pkg:deb/ubuntu/linux-aws-cloud-tools-4.4.0-1154?distro=xenial ubuntu linux-aws-cloud-tools-4.4.0-1154 < 4.4.0-1154.169 xenial
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...