USN-5808-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5808-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5808-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5808-1
Related
Published
2023-01-17T18:00:04.385657Z
Modified
2023-01-17T18:00:04.385657Z
Summary
linux-ibm-5.4 vulnerabilities
Details

It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-43945)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not properly handle packets structured in certain ways. An attacker in a guest VM could possibly use this to cause a denial of service (host NIC availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the Bluetooth subsystem in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2022-45934)

References

Affected packages

Ubuntu:18.04:LTS / linux-ibm-5.4

Package

Name
linux-ibm-5.4
Purl
pkg:deb/ubuntu/linux-ibm-5.4@5.4.0-1042.47~18.04.1?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0-1042.47~18.04.1

Affected versions

5.*

5.4.0-1010.11~18.04.2
5.4.0-1012.13~18.04.1
5.4.0-1014.15~18.04.1
5.4.0-1015.16~18.04.1
5.4.0-1017.19~18.04.1
5.4.0-1018.20~18.04.1
5.4.0-1019.21~18.04.1
5.4.0-1020.22~18.04.1
5.4.0-1021.23~18.04.1
5.4.0-1023.25~18.04.1
5.4.0-1026.29~18.04.1
5.4.0-1028.32~18.04.1
5.4.0-1029.33~18.04.1
5.4.0-1031.35~18.04.1
5.4.0-1032.36~18.04.1
5.4.0-1033.37~18.04.1
5.4.0-1034.38~18.04.1
5.4.0-1036.41~18.04.1
5.4.0-1037.42~18.04.1
5.4.0-1040.45~18.04.2
5.4.0-1041.46~18.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-image-unsigned-5.4.0-1042-ibm-dbgsym": "5.4.0-1042.47~18.04.1",
            "linux-headers-5.4.0-1042-ibm": "5.4.0-1042.47~18.04.1",
            "linux-ibm-5.4-tools-5.4.0-1042": "5.4.0-1042.47~18.04.1",
            "linux-tools-5.4.0-1042-ibm": "5.4.0-1042.47~18.04.1",
            "linux-modules-5.4.0-1042-ibm": "5.4.0-1042.47~18.04.1",
            "linux-ibm-5.4-cloud-tools-common": "5.4.0-1042.47~18.04.1",
            "linux-buildinfo-5.4.0-1042-ibm": "5.4.0-1042.47~18.04.1",
            "linux-modules-extra-5.4.0-1042-ibm": "5.4.0-1042.47~18.04.1",
            "linux-ibm-5.4-headers-5.4.0-1042": "5.4.0-1042.47~18.04.1",
            "linux-image-unsigned-5.4.0-1042-ibm": "5.4.0-1042.47~18.04.1",
            "linux-ibm-5.4-tools-common": "5.4.0-1042.47~18.04.1",
            "linux-ibm-5.4-source-5.4.0": "5.4.0-1042.47~18.04.1"
        }
    ]
}