USN-5774-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5774-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5774-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5774-1
Related
Published
2022-12-12T16:34:15.969489Z
Modified
2022-12-12T16:34:15.969489Z
Summary
linux-azure vulnerabilities
Details

Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42703)

It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-20422)

It was discovered that the KVM implementation in the Linux kernel did not properly handle virtual CPUs without APICs in certain situations. A local attacker could possibly use this to cause a denial of service (host system crash). (CVE-2022-2153)

Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978)

Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028)

It was discovered that the video4linux driver for Empia based TV cards in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3239)

It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-3524)

It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3564)

It was discovered that the ISDN implementation of the Linux kernel contained a use-after-free vulnerability. A privileged user could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3565)

It was discovered that the TCP implementation in the Linux kernel contained a data race condition. An attacker could possibly use this to cause undesired behaviors. (CVE-2022-3566)

It was discovered that the IPv6 implementation in the Linux kernel contained a data race condition. An attacker could possibly use this to cause undesired behaviors. (CVE-2022-3567)

It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in the Linux kernel did not properly handle certain error conditions. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service (memory exhaustion). (CVE-2022-3594)

It was discovered that a null pointer dereference existed in the NILFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3621)

It was discovered that the IDT 77252 ATM PCI device driver in the Linux kernel did not properly remove any pending timers during device exit, resulting in a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-3635)

It was discovered that the Netlink Transformation (XFRM) subsystem in the Linux kernel contained a reference counting error. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-36879)

Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX storage controller driver in the Linux kernel did not properly handle certain structures. A local attacker could potentially use this to expose sensitive information (kernel memory). (CVE-2022-40768)

References

Affected packages

Ubuntu:Pro:14.04:LTS / linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure@4.15.0-1157.172~14.04.2?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1157.172~14.04.2

Affected versions

4.*

4.15.0-1023.24~14.04.1
4.15.0-1030.31~14.04.1
4.15.0-1031.32~14.04.1
4.15.0-1032.33~14.04.2
4.15.0-1035.36~14.04.2
4.15.0-1036.38~14.04.2
4.15.0-1037.39~14.04.2
4.15.0-1039.41~14.04.2
4.15.0-1040.44~14.04.1
4.15.0-1041.45~14.04.1
4.15.0-1042.46~14.04.1
4.15.0-1045.49~14.04.1
4.15.0-1059.64~14.04.1
4.15.0-1060.65~14.04.1
4.15.0-1061.66~14.04.1
4.15.0-1063.68~14.04.1
4.15.0-1064.69~14.04.1
4.15.0-1066.71~14.04.1
4.15.0-1067.72~14.04.1
4.15.0-1069.74~14.04.1
4.15.0-1071.76~14.04.1
4.15.0-1074.79~14.04.1
4.15.0-1077.82~14.04.1
4.15.0-1082.92~14.04.1
4.15.0-1083.93~14.04.1
4.15.0-1089.99~14.04.1
4.15.0-1091.101~14.04.1
4.15.0-1092.102~14.04.1
4.15.0-1093.103~14.04.1
4.15.0-1095.105~14.04.1
4.15.0-1096.106~14.04.1
4.15.0-1098.109~14.04.1
4.15.0-1100.111~14.04.1
4.15.0-1102.113~14.04.1
4.15.0-1103.114~14.04.1
4.15.0-1106.118~14.04.1
4.15.0-1108.120~14.04.1
4.15.0-1109.121~14.04.1
4.15.0-1110.122~14.04.1
4.15.0-1111.123~14.04.1
4.15.0-1112.124~14.04.1
4.15.0-1113.126~14.04.1
4.15.0-1114.127~14.04.1
4.15.0-1115.128~14.04.1
4.15.0-1118.131~14.04.1
4.15.0-1121.134~14.04.1
4.15.0-1122.135~14.04.1
4.15.0-1123.136~14.04.1
4.15.0-1124.137~14.04.1
4.15.0-1125.138~14.04.1
4.15.0-1126.139~14.04.1
4.15.0-1127.140~14.04.1
4.15.0-1129.142~14.04.1
4.15.0-1130.143~14.04.1
4.15.0-1131.144~14.04.1
4.15.0-1133.146~14.04.1
4.15.0-1134.147~14.04.1
4.15.0-1136.149~14.04.1
4.15.0-1137.150~14.04.1
4.15.0-1138.151~14.04.1
4.15.0-1139.152~14.04.1
4.15.0-1142.156~14.04.1
4.15.0-1145.160~14.04.1
4.15.0-1146.161~14.04.1
4.15.0-1149.164~14.04.1
4.15.0-1150.165~14.04.1
4.15.0-1151.166~14.04.1
4.15.0-1153.168~14.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "linux-buildinfo-4.15.0-1157-azure": "4.15.0-1157.172~14.04.2",
            "linux-azure-headers-4.15.0-1157": "4.15.0-1157.172~14.04.2",
            "linux-azure-cloud-tools-4.15.0-1157": "4.15.0-1157.172~14.04.2",
            "linux-cloud-tools-4.15.0-1157-azure": "4.15.0-1157.172~14.04.2",
            "linux-azure-tools-4.15.0-1157": "4.15.0-1157.172~14.04.2",
            "linux-modules-extra-4.15.0-1157-azure": "4.15.0-1157.172~14.04.2",
            "linux-image-unsigned-4.15.0-1157-azure": "4.15.0-1157.172~14.04.2",
            "linux-tools-4.15.0-1157-azure": "4.15.0-1157.172~14.04.2",
            "linux-image-unsigned-4.15.0-1157-azure-dbgsym": "4.15.0-1157.172~14.04.2",
            "linux-modules-4.15.0-1157-azure": "4.15.0-1157.172~14.04.2",
            "linux-headers-4.15.0-1157-azure": "4.15.0-1157.172~14.04.2"
        }
    ]
}

Ubuntu:18.04:LTS / linux-azure-4.15

Package

Name
linux-azure-4.15
Purl
pkg:deb/ubuntu/linux-azure-4.15@4.15.0-1157.172?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1157.172

Affected versions

4.*

4.15.0-1082.92
4.15.0-1083.93
4.15.0-1089.99
4.15.0-1091.101
4.15.0-1092.102
4.15.0-1093.103
4.15.0-1095.105
4.15.0-1096.106
4.15.0-1099.110
4.15.0-1100.111
4.15.0-1102.113
4.15.0-1103.114
4.15.0-1104.116
4.15.0-1106.118
4.15.0-1108.120
4.15.0-1109.121
4.15.0-1110.122
4.15.0-1111.123
4.15.0-1112.125
4.15.0-1113.126
4.15.0-1114.127
4.15.0-1115.128
4.15.0-1118.131
4.15.0-1121.134
4.15.0-1122.135
4.15.0-1123.136
4.15.0-1124.137
4.15.0-1125.138
4.15.0-1126.139
4.15.0-1127.140
4.15.0-1129.142
4.15.0-1130.143
4.15.0-1131.144
4.15.0-1133.146
4.15.0-1134.147
4.15.0-1136.149
4.15.0-1137.150
4.15.0-1138.151
4.15.0-1139.152
4.15.0-1142.156
4.15.0-1145.160
4.15.0-1146.161
4.15.0-1149.164
4.15.0-1150.165
4.15.0-1151.166
4.15.0-1153.168

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-buildinfo-4.15.0-1157-azure": "4.15.0-1157.172",
            "linux-cloud-tools-4.15.0-1157-azure": "4.15.0-1157.172",
            "linux-azure-4.15-headers-4.15.0-1157": "4.15.0-1157.172",
            "linux-modules-extra-4.15.0-1157-azure": "4.15.0-1157.172",
            "linux-azure-4.15-cloud-tools-4.15.0-1157": "4.15.0-1157.172",
            "linux-image-unsigned-4.15.0-1157-azure": "4.15.0-1157.172",
            "linux-tools-4.15.0-1157-azure": "4.15.0-1157.172",
            "linux-azure-4.15-tools-4.15.0-1157": "4.15.0-1157.172",
            "linux-image-unsigned-4.15.0-1157-azure-dbgsym": "4.15.0-1157.172",
            "linux-modules-4.15.0-1157-azure": "4.15.0-1157.172",
            "linux-headers-4.15.0-1157-azure": "4.15.0-1157.172"
        }
    ]
}