-
Notifications
You must be signed in to change notification settings - Fork 0
/
USN-5682-1.json
120 lines (120 loc) · 6.08 KB
/
USN-5682-1.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
{
"id": "USN-5682-1",
"summary": "linux-aws-5.4 vulnerabilities",
"details": "It was discovered that the BPF verifier in the Linux kernel did not\nproperly handle internal data structures. A local attacker could use this\nto expose sensitive information (kernel memory). (CVE-2021-4159)\n\nIt was discovered that an out-of-bounds write vulnerability existed in the\nVideo for Linux 2 (V4L2) implementation in the Linux kernel. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2022-20369)\n\nDuoming Zhou discovered that race conditions existed in the timer handling\nimplementation of the Linux kernel's Rose X.25 protocol layer, resulting in\nuse-after-free vulnerabilities. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2022-2318)\n\nRoger Pau Monn\u00e9 discovered that the Xen virtual block driver in the Linux\nkernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-26365)\n\nPawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan\nand Ariel Sabba discovered that some Intel processors with Enhanced\nIndirect Branch Restricted Speculation (eIBRS) did not properly handle RET\ninstructions after a VM exits. A local attacker could potentially use this\nto expose sensitive information. (CVE-2022-26373)\n\nEric Biggers discovered that a use-after-free vulnerability existed in the\nio_uring subsystem in the Linux kernel. A local attacker could possibly use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2022-3176)\n\nRoger Pau Monn\u00e9 discovered that the Xen paravirtualization frontend in the\nLinux kernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-33740)\n\nIt was discovered that the Xen paravirtualization frontend in the Linux\nkernel incorrectly shared unrelated data when communicating with certain\nbackends. A local attacker could use this to cause a denial of service\n(guest crash) or expose sensitive information (guest kernel memory).\n(CVE-2022-33741, CVE-2022-33742)\n\nOleksandr Tyshchenko discovered that the Xen paravirtualization platform in\nthe Linux kernel on ARM platforms contained a race condition in certain\nsituations. An attacker in a guest VM could use this to cause a denial of\nservice in the host OS. (CVE-2022-33744)\n\nIt was discovered that the Netlink Transformation (XFRM) subsystem in the\nLinux kernel contained a reference counting error. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2022-36879)\n\n",
"aliases": [],
"related": [
"CVE-2021-4159",
"CVE-2022-20369",
"CVE-2022-2318",
"CVE-2022-26365",
"CVE-2022-26373",
"CVE-2022-3176",
"CVE-2022-33740",
"CVE-2022-33741",
"CVE-2022-33742",
"CVE-2022-33744",
"CVE-2022-36879"
],
"published": "2022-10-14T18:46:48.561069Z",
"modified": "2022-10-14T18:46:48.561069Z",
"affected": [
{
"package": {
"ecosystem": "Ubuntu:18.04:LTS",
"name": "linux-aws-5.4"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "5.4.0-1086.93~18.04.1"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"linux-modules-extra-aws": "5.4.0.1086.66",
"linux-aws-edge": "5.4.0.1086.66",
"linux-modules-extra-aws-edge": "5.4.0.1086.66",
"linux-tools-aws-edge": "5.4.0.1086.66",
"linux-aws-5.4-cloud-tools-5.4.0-1086": "5.4.0-1086.93~18.04.1",
"linux-image-unsigned-5.4.0-1086-aws": "5.4.0-1086.93~18.04.1",
"linux-image-aws-edge": "5.4.0.1086.66",
"linux-modules-extra-5.4.0-1086-aws": "5.4.0-1086.93~18.04.1",
"linux-image-5.4.0-1086-aws": "5.4.0-1086.93~18.04.1",
"linux-cloud-tools-5.4.0-1086-aws": "5.4.0-1086.93~18.04.1",
"linux-buildinfo-5.4.0-1086-aws": "5.4.0-1086.93~18.04.1",
"linux-aws-5.4-tools-5.4.0-1086": "5.4.0-1086.93~18.04.1",
"linux-aws-5.4-headers-5.4.0-1086": "5.4.0-1086.93~18.04.1",
"linux-modules-5.4.0-1086-aws": "5.4.0-1086.93~18.04.1",
"linux-headers-aws": "5.4.0.1086.66",
"linux-headers-aws-edge": "5.4.0.1086.66",
"linux-image-aws": "5.4.0.1086.66",
"linux-aws": "5.4.0.1086.66",
"linux-tools-5.4.0-1086-aws": "5.4.0-1086.93~18.04.1",
"linux-tools-aws": "5.4.0.1086.66",
"linux-headers-5.4.0-1086-aws": "5.4.0-1086.93~18.04.1"
}
],
"availability": "No subscription needed"
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/notices/USN-5682-1"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-4159"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-20369"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-2318"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-26365"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-26373"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-3176"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-33740"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-33741"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-33742"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-33744"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2022-36879"
}
]
}