USN-5727-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-5727-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5727-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5727-2
Related
Published
2022-11-18T20:47:25.874489Z
Modified
2022-11-18T20:47:25.874489Z
Summary
linux-gcp, linux-gcp-4.15 vulnerabilities
Details

It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-20422)

It was discovered that the KVM implementation in the Linux kernel did not properly handle virtual CPUs without APICs in certain situations. A local attacker could possibly use this to cause a denial of service (host system crash). (CVE-2022-2153)

Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978)

Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028)

It was discovered that the IDT 77252 ATM PCI device driver in the Linux kernel did not properly remove any pending timers during device exit, resulting in a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-3635)

It was discovered that the Netlink Transformation (XFRM) subsystem in the Linux kernel contained a reference counting error. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-36879)

Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX storage controller driver in the Linux kernel did not properly handle certain structures. A local attacker could potentially use this to expose sensitive information (kernel memory). (CVE-2022-40768)

References

Affected packages

Ubuntu:Pro:16.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1138.154~16.04.1

Affected versions

4.*

4.10.0-1004.4
4.10.0-1006.6
4.10.0-1007.7
4.10.0-1008.8
4.10.0-1009.9
4.13.0-1002.5
4.13.0-1006.9
4.13.0-1007.10
4.13.0-1008.11
4.13.0-1011.15
4.13.0-1012.16
4.13.0-1013.17
4.13.0-1015.19
4.13.0-1017.21
4.13.0-1019.23
4.15.0-1014.14~16.04.1
4.15.0-1015.15~16.04.1
4.15.0-1017.18~16.04.1
4.15.0-1018.19~16.04.2
4.15.0-1019.20~16.04.1
4.15.0-1021.22~16.04.1
4.15.0-1023.24~16.04.1
4.15.0-1024.25~16.04.2
4.15.0-1025.26~16.04.1
4.15.0-1026.27~16.04.1
4.15.0-1027.28~16.04.1
4.15.0-1028.29~16.04.1
4.15.0-1029.31~16.04.1
4.15.0-1030.32~16.04.1
4.15.0-1032.34~16.04.1
4.15.0-1033.35~16.04.1
4.15.0-1034.36~16.04.1
4.15.0-1036.38~16.04.1
4.15.0-1037.39~16.04.1
4.15.0-1040.42~16.04.1
4.15.0-1041.43
4.15.0-1042.44
4.15.0-1044.46
4.15.0-1046.49
4.15.0-1047.50
4.15.0-1049.52
4.15.0-1050.53
4.15.0-1052.56
4.15.0-1055.59
4.15.0-1058.62
4.15.0-1060.64
4.15.0-1061.65
4.15.0-1071.81~16.04.1
4.15.0-1077.87~16.04.1
4.15.0-1078.88~16.04.1
4.15.0-1080.90~16.04.1
4.15.0-1081.92~16.04.1
4.15.0-1083.94~16.04.1
4.15.0-1084.95~16.04.1
4.15.0-1086.98~16.04.1
4.15.0-1087.100~16.04.1
4.15.0-1088.101~16.04.1
4.15.0-1090.103~16.04.1
4.15.0-1091.104~16.04.1
4.15.0-1092.105~16.04.1
4.15.0-1093.106~16.04.1
4.15.0-1094.107~16.04.1
4.15.0-1095.108~16.04.1
4.15.0-1096.109~16.04.1
4.15.0-1097.110~16.04.1
4.15.0-1098.111~16.04.1
4.15.0-1099.112~16.04.1
4.15.0-1100.113~16.04.1
4.15.0-1103.116~16.04.1
4.15.0-1106.120~16.04.1
4.15.0-1107.121~16.04.1
4.15.0-1108.122~16.04.1
4.15.0-1109.123~16.04.1
4.15.0-1110.124~16.04.1
4.15.0-1111.125~16.04.1
4.15.0-1112.126~16.04.1
4.15.0-1114.128~16.04.1
4.15.0-1115.129~16.04.1
4.15.0-1116.130~16.04.1
4.15.0-1118.132~16.04.1
4.15.0-1119.133~16.04.1
4.15.0-1120.134~16.04.1
4.15.0-1121.135~16.04.1
4.15.0-1122.136~16.04.1
4.15.0-1124.138~16.04.1
4.15.0-1127.142~16.04.1
4.15.0-1130.146~16.04.1
4.15.0-1131.147~16.04.1
4.15.0-1134.150~16.04.2
4.15.0-1135.151~16.04.2
4.15.0-1136.152~16.04.1
4.15.0-1137.153~16.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "4.15.0-1138.154~16.04.1",
            "binary_name": "linux-buildinfo-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154~16.04.1",
            "binary_name": "linux-gcp-headers-4.15.0-1138"
        },
        {
            "binary_version": "4.15.0-1138.154~16.04.1",
            "binary_name": "linux-gcp-tools-4.15.0-1138"
        },
        {
            "binary_version": "4.15.0-1138.154~16.04.1",
            "binary_name": "linux-headers-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154~16.04.1",
            "binary_name": "linux-image-unsigned-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154~16.04.1",
            "binary_name": "linux-image-unsigned-4.15.0-1138-gcp-dbgsym"
        },
        {
            "binary_version": "4.15.0-1138.154~16.04.1",
            "binary_name": "linux-modules-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154~16.04.1",
            "binary_name": "linux-modules-extra-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154~16.04.1",
            "binary_name": "linux-tools-4.15.0-1138-gcp"
        }
    ]
}

Ubuntu:18.04:LTS / linux-gcp-4.15

Package

Name
linux-gcp-4.15
Purl
pkg:deb/ubuntu/linux-gcp-4.15?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1138.154

Affected versions

4.*

4.15.0-1071.81
4.15.0-1077.87
4.15.0-1078.88
4.15.0-1080.90
4.15.0-1081.92
4.15.0-1083.94
4.15.0-1084.95
4.15.0-1086.98
4.15.0-1087.100
4.15.0-1088.101
4.15.0-1090.103
4.15.0-1091.104
4.15.0-1092.105
4.15.0-1093.106
4.15.0-1094.107
4.15.0-1095.108
4.15.0-1096.109
4.15.0-1097.110
4.15.0-1098.111
4.15.0-1099.112
4.15.0-1100.113
4.15.0-1103.116
4.15.0-1106.120
4.15.0-1107.121
4.15.0-1108.122
4.15.0-1109.123
4.15.0-1110.124
4.15.0-1111.125
4.15.0-1112.126
4.15.0-1114.128
4.15.0-1115.129
4.15.0-1116.130
4.15.0-1118.132
4.15.0-1119.133
4.15.0-1120.134
4.15.0-1121.135
4.15.0-1122.136
4.15.0-1124.138
4.15.0-1127.142
4.15.0-1130.146
4.15.0-1131.147
4.15.0-1134.150
4.15.0-1135.151
4.15.0-1136.152
4.15.0-1137.153

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.15.0-1138.154",
            "binary_name": "linux-buildinfo-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154",
            "binary_name": "linux-gcp-4.15-headers-4.15.0-1138"
        },
        {
            "binary_version": "4.15.0-1138.154",
            "binary_name": "linux-gcp-4.15-tools-4.15.0-1138"
        },
        {
            "binary_version": "4.15.0-1138.154",
            "binary_name": "linux-headers-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154",
            "binary_name": "linux-image-unsigned-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154",
            "binary_name": "linux-image-unsigned-4.15.0-1138-gcp-dbgsym"
        },
        {
            "binary_version": "4.15.0-1138.154",
            "binary_name": "linux-modules-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154",
            "binary_name": "linux-modules-extra-4.15.0-1138-gcp"
        },
        {
            "binary_version": "4.15.0-1138.154",
            "binary_name": "linux-tools-4.15.0-1138-gcp"
        }
    ]
}