USN-5991-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5991-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5991-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5991-1
Related
Published
2023-03-31T12:58:11.082938Z
Modified
2023-03-31T12:58:11.082938Z
Summary
linux-gcp-4.15 vulnerabilities
Details

It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-3669)

It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3424)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-36280)

Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not properly perform reference counting in some situations, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-41218)

It was discovered that the network queuing discipline implementation in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-47929)

José Oliveira and Rodrigo Branco discovered that the prctl syscall implementation in the Linux kernel did not properly protect against indirect branch prediction attacks in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2023-0045)

It was discovered that a use-after-free vulnerability existed in the Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-0266)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel contained a NULL pointer dereference vulnerability in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-0394)

Kyle Zeng discovered that the ATM VC queuing discipline implementation in the Linux kernel contained a type confusion vulnerability in some situations. An attacker could use this to cause a denial of service (system crash). (CVE-2023-23455)

It was discovered that the RNDIS USB driver in the Linux kernel contained an integer overflow vulnerability. A local attacker with physical access could plug in a malicious USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-23559)

Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel contained a null pointer dereference when handling certain messages from user space. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-28328)

References

Affected packages

Ubuntu:18.04:LTS / linux-gcp-4.15

Package

Name
linux-gcp-4.15
Purl
pkg:deb/ubuntu/linux-gcp-4.15?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.15.0-1147.163

Affected versions

4.*

4.15.0-1071.81
4.15.0-1077.87
4.15.0-1078.88
4.15.0-1080.90
4.15.0-1081.92
4.15.0-1083.94
4.15.0-1084.95
4.15.0-1086.98
4.15.0-1087.100
4.15.0-1088.101
4.15.0-1090.103
4.15.0-1091.104
4.15.0-1092.105
4.15.0-1093.106
4.15.0-1094.107
4.15.0-1095.108
4.15.0-1096.109
4.15.0-1097.110
4.15.0-1098.111
4.15.0-1099.112
4.15.0-1100.113
4.15.0-1103.116
4.15.0-1106.120
4.15.0-1107.121
4.15.0-1108.122
4.15.0-1109.123
4.15.0-1110.124
4.15.0-1111.125
4.15.0-1112.126
4.15.0-1114.128
4.15.0-1115.129
4.15.0-1116.130
4.15.0-1118.132
4.15.0-1119.133
4.15.0-1120.134
4.15.0-1121.135
4.15.0-1122.136
4.15.0-1124.138
4.15.0-1127.142
4.15.0-1130.146
4.15.0-1131.147
4.15.0-1134.150
4.15.0-1135.151
4.15.0-1136.152
4.15.0-1137.153
4.15.0-1138.154
4.15.0-1141.157
4.15.0-1142.158
4.15.0-1143.159
4.15.0-1145.161
4.15.0-1146.162

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.15.0-1147.163",
            "binary_name": "linux-buildinfo-4.15.0-1147-gcp"
        },
        {
            "binary_version": "4.15.0-1147.163",
            "binary_name": "linux-gcp-4.15-headers-4.15.0-1147"
        },
        {
            "binary_version": "4.15.0-1147.163",
            "binary_name": "linux-gcp-4.15-tools-4.15.0-1147"
        },
        {
            "binary_version": "4.15.0-1147.163",
            "binary_name": "linux-headers-4.15.0-1147-gcp"
        },
        {
            "binary_version": "4.15.0-1147.163",
            "binary_name": "linux-image-unsigned-4.15.0-1147-gcp"
        },
        {
            "binary_version": "4.15.0-1147.163",
            "binary_name": "linux-image-unsigned-4.15.0-1147-gcp-dbgsym"
        },
        {
            "binary_version": "4.15.0-1147.163",
            "binary_name": "linux-modules-4.15.0-1147-gcp"
        },
        {
            "binary_version": "4.15.0-1147.163",
            "binary_name": "linux-modules-extra-4.15.0-1147-gcp"
        },
        {
            "binary_version": "4.15.0-1147.163",
            "binary_name": "linux-tools-4.15.0-1147-gcp"
        }
    ]
}