ubuntu jammy v1.80
Metadata:
BOSH Agent Version: 2.499.0
USNs:
Title: USN-5785-1: FreeRADIUS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5785-1
Priorities: low,medium
Description:
It was discovered that FreeRADIUS incorrectly handled multiple EAP-pwd
handshakes. An attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-17185)
Shane Guan discovered that FreeRADIUS incorrectly handled memory when
checking unknown SIM option sent by EAP-SIM supplicant. An attacker could
possibly use this issue to cause a denial of service on the server. This
issue only affected Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04
LTS. (CVE-2022-41860)
It was discovered that FreeRADIUS incorrectly handled memory when
processing certain abinary attributes. An attacker could possibly use this
issue to cause a denial of service on the server. (CVE-2022-41861)
CVEs:
- https://ubuntu.com/security/CVE-2019-17185
- https://ubuntu.com/security/CVE-2022-41860
- https://ubuntu.com/security/CVE-2022-41861
- https://ubuntu.com/security/CVE-2019-17185
- https://ubuntu.com/security/CVE-2022-41860
- https://ubuntu.com/security/CVE-2022-41861
Title: USN-5792-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5792-1
Priorities: medium,low
Description:
Mingwei Zhang discovered that the KVM implementation for AMD processors in
the Linux kernel did not properly handle cache coherency with Secure
Encrypted Virtualization (SEV). A local attacker could possibly use this to
cause a denial of service (host system crash). (CVE-2022-0171)
It was discovered that a race condition existed in the Android Binder IPC
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-20421)
David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)
It was discovered that the Intel 740 frame buffer driver in the Linux
kernel contained a divide by zero vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3061)
It was discovered that the sound subsystem in the Linux kernel contained a
race condition in some situations. A local attacker could use this to cause
a denial of service (system crash). (CVE-2022-3303)
Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)
It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)
Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)
Jann Horn discovered a race condition existed in the Linux kernel when
unmapping VMAs in certain situations, resulting in possible use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-39188)
Hyunwoo Kim discovered that an integer overflow vulnerability existed in
the PXA3xx graphics driver in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2022-39842)
It was discovered that a race condition existed in the EFI capsule loader
driver in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-40307)
Zheng Wang and Zhuorao Yang discovered that the RealTek RTL8712U wireless
driver in the Linux kernel contained a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-4095)
It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)
CVEs:
- https://ubuntu.com/security/CVE-2022-0171
- https://ubuntu.com/security/CVE-2022-20421
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-40307
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-20421
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-0171
- https://ubuntu.com/security/CVE-2022-40307
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-3303
Title: USN-5801-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5801-1
Priorities: medium
Description:
It was discovered that Vim makes illegal memory calls when pasting
brackets in Ex mode. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. This issue
affected only Ubuntu 20.04 and 22.04 (CVE-2022-0392)
It was discovered that Vim makes illegal memory calls when making
certain retab calls. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. (CVE-2022-0417)
CVEs:
- https://ubuntu.com/security/CVE-2022-0392
- https://ubuntu.com/security/CVE-2022-0417
- https://ubuntu.com/security/CVE-2022-0392
- https://ubuntu.com/security/CVE-2022-0417
Title: USN-5810-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5810-1
Priorities: medium
Description:
Markus Vervier and Eric Sesterhenn discovered that Git incorrectly handled certain
gitattributes. An attacker could possibly use this issue to cause a crash
or execute arbitrary code. (CVE-2022-23521)
Joern Schneeweisz discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. (CVE-2022-41903)
CVEs:
- https://ubuntu.com/security/CVE-2022-23521
- https://ubuntu.com/security/CVE-2022-41903
- https://ubuntu.com/security/CVE-2022-41903
- https://ubuntu.com/security/CVE-2022-23521
Title: USN-5780-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5780-1
Priorities: medium,high
Description:
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)
It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
CVEs:
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42896
Title: USN-5786-1: GNOME Files vulnerability
URL: https://ubuntu.com/security/notices/USN-5786-1
Priorities: medium
Description:
It was discovered that GNOME Files incorrectly handled certain filenames.
An attacker could possibly use this issue to cause GNOME Files to crash,
leading to a denial of service.
CVEs:
Title: USN-5796-1: w3m vulnerability
URL: https://ubuntu.com/security/notices/USN-5796-1
Priorities: medium
Description:
It was discovered that w3m incorrectly handled certain HTML files. A remote
attacker could use this issue to cause w3m to crash, resulting in a denial
of service, or possibly execute arbitrary code.
CVEs:
Title: USN-5788-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5788-1
Priorities: medium
Description:
Hiroki Kurosawa discovered that curl incorrectly handled HSTS support
when certain hostnames included IDN characters. A remote attacker could
possibly use this issue to cause curl to use unencrypted connections. This
issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-43551)
It was discovered that curl incorrectly handled denials when using HTTP
proxies. A remote attacker could use this issue to cause curl to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2022-43552)
CVEs:
- https://ubuntu.com/security/CVE-2022-43551
- https://ubuntu.com/security/CVE-2022-43552
- https://ubuntu.com/security/CVE-2022-43551
- https://ubuntu.com/security/CVE-2022-43552
Title: USN-5799-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5799-1
Priorities: high
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
CVEs:
Title: USN-5803-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5803-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-45934
Title: USN-5814-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5814-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)
It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
Title: USN-5807-1: libXpm vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5807-1
Priorities: medium
Description:
Martin Ettl discovered that libXpm incorrectly handled certain XPM files.
If a user or automated system were tricked into opening a specially crafted
XPM file, a remote attacker could possibly use this issue to cause libXpm
to stop responding, resulting in a denial of service. (CVE-2022-44617)
Marco Ivaldi discovered that libXpm incorrectly handled certain XPM files.
If a user or automated system were tricked into opening a specially crafted
XPM file, a remote attacker could possibly use this issue to cause libXpm
to stop responding, resulting in a denial of service. (CVE-2022-46285)
Alan Coopersmith discovered that libXpm incorrectly handled calling
external helper binaries. If libXpm was being used by a setuid binary, a
local attacker could possibly use this issue to escalate privileges.
(CVE-2022-4883)
CVEs:
- https://ubuntu.com/security/CVE-2022-44617
- https://ubuntu.com/security/CVE-2022-46285
- https://ubuntu.com/security/CVE-2022-4883
- https://ubuntu.com/security/CVE-2022-46285
- https://ubuntu.com/security/CVE-2022-44617
- https://ubuntu.com/security/CVE-2022-4883
Title: USN-5795-1: Net-SNMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5795-1
Priorities: medium
Description:
It was discovered that Net-SNMP incorrectly handled certain requests. A
remote attacker could possibly use these issues to cause Net-SNMP to crash,
resulting in a denial of service.
CVEs:
Title: USN-5787-1: Libksba vulnerability
URL: https://ubuntu.com/security/notices/USN-5787-1
Priorities: medium
Description:
It was discovered that Libksba incorrectly handled parsing CRL signatures.
A remote attacker could use this issue to cause Libksba to crash, resulting
in a denial of service, or possibly execute arbitrary code.
CVEs:
Title: USN-5798-1: .NET 6 vulnerability
URL: https://ubuntu.com/security/notices/USN-5798-1
Priorities: medium
Description:
Johan Gorter discovered that .NET 6 incorrectly processed certain
invalid HTTP requests. An attacker could possibly use this issue to
cause a denial of service condition for an exposed endpoint.
CVEs:
Title: USN-5811-1: Sudo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5811-1
Priorities: medium
Description:
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
handled user-specified editors when using the sudoedit command. A local
attacker that has permission to use the sudoedit command could possibly use
this issue to edit arbitrary files. (CVE-2023-22809)
It was discovered that the Protobuf-c library, used by Sudo, incorrectly
handled certain arithmetic shifts. An attacker could possibly use this
issue to cause Sudo to crash, resulting in a denial of service. This issue
only affected Ubuntu 22.04 LTS. (CVE-2022-33070)
CVEs: