USN-5925-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5925-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5925-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5925-1
Related
Published
2023-03-06T23:22:29.212889Z
Modified
2023-03-06T23:22:29.212889Z
Summary
linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities
Details

It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-0461)

It was discovered that a race condition existed in the Kernel Connection Multiplexor (KCM) socket implementation in the Linux kernel when releasing sockets in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3545)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform bounds checking in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3628)

It was discovered that a use-after-free vulnerability existed in the Bluetooth stack in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3640)

It was discovered that a race condition existed in the Xen network backend driver in the Linux kernel when handling dropped packets in certain circumstances. An attacker could use this to cause a denial of service (kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-42895)

References

Affected packages

Ubuntu:18.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm@4.15.0-1136.141?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1136.141

Affected versions

4.*

4.15.0-1002.2
4.15.0-1003.3
4.15.0-1004.4
4.15.0-1006.6
4.15.0-1008.8
4.15.0-1010.10
4.15.0-1011.11
4.15.0-1012.12
4.15.0-1016.16
4.15.0-1017.17
4.15.0-1019.19
4.15.0-1020.20
4.15.0-1021.21
4.15.0-1023.23
4.15.0-1025.25
4.15.0-1026.26
4.15.0-1027.27
4.15.0-1028.28
4.15.0-1029.29
4.15.0-1030.30
4.15.0-1031.31
4.15.0-1032.32
4.15.0-1034.34
4.15.0-1035.35
4.15.0-1036.36
4.15.0-1038.38
4.15.0-1039.39
4.15.0-1042.42
4.15.0-1043.43
4.15.0-1044.44
4.15.0-1046.46
4.15.0-1047.47
4.15.0-1048.48
4.15.0-1050.50
4.15.0-1051.51
4.15.0-1052.52
4.15.0-1053.53
4.15.0-1056.57
4.15.0-1058.59
4.15.0-1059.60
4.15.0-1060.61
4.15.0-1067.68
4.15.0-1069.70
4.15.0-1071.72
4.15.0-1072.73
4.15.0-1074.75
4.15.0-1075.76
4.15.0-1077.79
4.15.0-1079.81
4.15.0-1081.83
4.15.0-1082.84
4.15.0-1084.86
4.15.0-1085.87
4.15.0-1086.88
4.15.0-1087.89
4.15.0-1088.90
4.15.0-1089.91
4.15.0-1090.92
4.15.0-1091.93
4.15.0-1092.94
4.15.0-1094.96
4.15.0-1097.99
4.15.0-1098.100
4.15.0-1099.101
4.15.0-1100.102
4.15.0-1101.103
4.15.0-1102.104
4.15.0-1103.105
4.15.0-1105.107
4.15.0-1106.108
4.15.0-1107.109
4.15.0-1109.112
4.15.0-1110.113
4.15.0-1112.115
4.15.0-1113.116
4.15.0-1114.117
4.15.0-1116.119
4.15.0-1119.123
4.15.0-1122.127
4.15.0-1123.128
4.15.0-1125.130
4.15.0-1126.131
4.15.0-1127.132
4.15.0-1128.133
4.15.0-1129.134
4.15.0-1132.137
4.15.0-1133.138
4.15.0-1134.139
4.15.0-1135.140

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-buildinfo-4.15.0-1136-kvm": "4.15.0-1136.141",
            "linux-tools-4.15.0-1136-kvm": "4.15.0-1136.141",
            "linux-headers-4.15.0-1136-kvm": "4.15.0-1136.141",
            "linux-kvm-tools-4.15.0-1136": "4.15.0-1136.141",
            "linux-modules-4.15.0-1136-kvm": "4.15.0-1136.141",
            "linux-image-4.15.0-1136-kvm-dbgsym": "4.15.0-1136.141",
            "linux-image-4.15.0-1136-kvm": "4.15.0-1136.141",
            "linux-kvm-headers-4.15.0-1136": "4.15.0-1136.141"
        }
    ]
}

Ubuntu:18.04:LTS / linux-raspi2

Package

Name
linux-raspi2
Purl
pkg:deb/ubuntu/linux-raspi2@4.15.0-1128.136?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1128.136

Affected versions

4.*

4.13.0-1005.5
4.13.0-1006.6
4.13.0-1008.8
4.15.0-1006.7
4.15.0-1009.10
4.15.0-1010.11
4.15.0-1011.12
4.15.0-1012.13
4.15.0-1013.14
4.15.0-1017.18
4.15.0-1018.19
4.15.0-1020.22
4.15.0-1021.23
4.15.0-1022.24
4.15.0-1024.26
4.15.0-1026.28
4.15.0-1027.29
4.15.0-1028.30
4.15.0-1029.31
4.15.0-1030.32
4.15.0-1031.33
4.15.0-1032.34
4.15.0-1033.35
4.15.0-1034.36
4.15.0-1036.38
4.15.0-1037.39
4.15.0-1038.40
4.15.0-1040.43
4.15.0-1041.44
4.15.0-1043.46
4.15.0-1044.47
4.15.0-1045.49
4.15.0-1047.51
4.15.0-1048.52
4.15.0-1049.53
4.15.0-1050.54
4.15.0-1052.56
4.15.0-1053.57
4.15.0-1054.58
4.15.0-1055.59
4.15.0-1057.61
4.15.0-1060.64
4.15.0-1061.65
4.15.0-1062.66
4.15.0-1063.67
4.15.0-1065.69
4.15.0-1067.71
4.15.0-1068.72
4.15.0-1070.74
4.15.0-1071.75
4.15.0-1073.78
4.15.0-1074.79
4.15.0-1076.81
4.15.0-1077.82
4.15.0-1078.83
4.15.0-1079.84
4.15.0-1080.85
4.15.0-1081.86
4.15.0-1082.87
4.15.0-1083.88
4.15.0-1084.89
4.15.0-1085.90
4.15.0-1086.91
4.15.0-1089.94
4.15.0-1092.98
4.15.0-1093.99
4.15.0-1094.100
4.15.0-1095.101
4.15.0-1096.102
4.15.0-1097.103
4.15.0-1098.104
4.15.0-1099.106
4.15.0-1101.108
4.15.0-1102.109
4.15.0-1103.110
4.15.0-1105.112
4.15.0-1106.113
4.15.0-1107.114
4.15.0-1108.115
4.15.0-1109.116
4.15.0-1111.118
4.15.0-1114.122
4.15.0-1115.123
4.15.0-1117.125
4.15.0-1118.126
4.15.0-1119.127
4.15.0-1120.128
4.15.0-1121.129
4.15.0-1124.132
4.15.0-1125.133
4.15.0-1126.134
4.15.0-1127.135

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-image-4.15.0-1128-raspi2": "4.15.0-1128.136",
            "linux-modules-4.15.0-1128-raspi2": "4.15.0-1128.136",
            "linux-image-4.15.0-1128-raspi2-dbgsym": "4.15.0-1128.136",
            "linux-tools-4.15.0-1128-raspi2": "4.15.0-1128.136",
            "linux-raspi2-tools-4.15.0-1128": "4.15.0-1128.136",
            "linux-buildinfo-4.15.0-1128-raspi2": "4.15.0-1128.136",
            "linux-raspi2-headers-4.15.0-1128": "4.15.0-1128.136",
            "linux-headers-4.15.0-1128-raspi2": "4.15.0-1128.136"
        }
    ]
}

Ubuntu:18.04:LTS / linux-snapdragon

Package

Name
linux-snapdragon
Purl
pkg:deb/ubuntu/linux-snapdragon@4.15.0-1146.156?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1146.156

Affected versions

4.*

4.4.0-1077.82
4.4.0-1078.83
4.4.0-1079.84
4.4.0-1081.86
4.15.0-1053.57
4.15.0-1054.58
4.15.0-1055.59
4.15.0-1057.62
4.15.0-1058.64
4.15.0-1060.66
4.15.0-1062.69
4.15.0-1064.71
4.15.0-1065.72
4.15.0-1066.73
4.15.0-1067.74
4.15.0-1069.76
4.15.0-1070.77
4.15.0-1071.78
4.15.0-1072.79
4.15.0-1074.81
4.15.0-1076.83
4.15.0-1077.84
4.15.0-1079.86
4.15.0-1080.87
4.15.0-1081.88
4.15.0-1083.91
4.15.0-1084.92
4.15.0-1086.94
4.15.0-1087.95
4.15.0-1089.98
4.15.0-1090.99
4.15.0-1091.100
4.15.0-1093.102
4.15.0-1094.103
4.15.0-1095.104
4.15.0-1096.105
4.15.0-1097.106
4.15.0-1098.107
4.15.0-1099.108
4.15.0-1100.109
4.15.0-1101.110
4.15.0-1102.111
4.15.0-1103.112
4.15.0-1106.115
4.15.0-1109.118
4.15.0-1110.119
4.15.0-1111.120
4.15.0-1112.121
4.15.0-1113.122
4.15.0-1114.123
4.15.0-1115.124
4.15.0-1116.125
4.15.0-1118.127
4.15.0-1119.128
4.15.0-1120.129
4.15.0-1122.131
4.15.0-1123.132
4.15.0-1125.134
4.15.0-1126.135
4.15.0-1127.136
4.15.0-1129.138
4.15.0-1132.142
4.15.0-1133.143
4.15.0-1135.145
4.15.0-1136.146
4.15.0-1137.147
4.15.0-1138.148
4.15.0-1139.149
4.15.0-1142.152
4.15.0-1143.153
4.15.0-1144.154
4.15.0-1145.155

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-headers-4.15.0-1146-snapdragon": "4.15.0-1146.156",
            "linux-buildinfo-4.15.0-1146-snapdragon": "4.15.0-1146.156",
            "linux-snapdragon-headers-4.15.0-1146": "4.15.0-1146.156",
            "linux-tools-4.15.0-1146-snapdragon": "4.15.0-1146.156",
            "linux-snapdragon-tools-4.15.0-1146": "4.15.0-1146.156",
            "linux-image-4.15.0-1146-snapdragon-dbgsym": "4.15.0-1146.156",
            "linux-image-4.15.0-1146-snapdragon": "4.15.0-1146.156",
            "linux-modules-4.15.0-1146-snapdragon": "4.15.0-1146.156"
        }
    ]
}