{"id":"USN-5602-1","summary":"linux-raspi vulnerabilities","details":"\nAsaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)\nEthernet driver for the Linux kernel performed insufficient control flow\nmanagement. A local attacker could possibly use this to cause a denial of\nservice. (CVE-2021-33061)\n\nMoshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation\nin the Linux kernel did not provide sufficient randomization when\ncalculating port offsets. An attacker could possibly use this to expose\nsensitive information. (CVE-2022-1012)\n\nNorbert Slusarek discovered that a race condition existed in the perf\nsubsystem in the Linux kernel, resulting in a use-after-free vulnerability.\nA privileged local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2022-1729)\n\nQiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor\nimplementation in the Linux kernel did not properly handle an illegal\ninstruction in a guest, resulting in a null pointer dereference. An\nattacker in a guest VM could use this to cause a denial of service (system\ncrash) in the host OS. (CVE-2022-1852)\n\nIt was discovered that the UDF file system implementation in the Linux\nkernel contained an out-of-bounds write vulnerability. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2022-1943)\n\nGerald Lee discovered that the NTFS file system implementation in the Linux\nkernel did not properly handle certain error conditions, leading to a use-\nafter-free vulnerability. A local attacker could use this to cause a denial\nof service (system crash) or possibly expose sensitive information.\n(CVE-2022-1973)\n\nIt was discovered that the device-mapper verity (dm-verity) driver in the\nLinux kernel did not properly verify targets being loaded into the device-\nmapper table. A privileged attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2022-2503)\n\nZheyu Ma discovered that the Intel iSMT SMBus host controller driver in the\nLinux kernel contained an out-of-bounds write vulnerability. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2022-2873)\n\nSelim Enes Karaduman discovered that a race condition existed in the pipe\nbuffers implementation of the Linux kernel. A local attacker could use this\nto cause a denial of service (system crash) or possibly escalate\nprivileges. (CVE-2022-2959)\n\n","modified":"2026-02-10T04:42:46Z","published":"2022-09-08T18:44:19Z","related":["UBUNTU-CVE-2021-33061","UBUNTU-CVE-2022-1012","UBUNTU-CVE-2022-1729","UBUNTU-CVE-2022-1852","UBUNTU-CVE-2022-1943","UBUNTU-CVE-2022-1973","UBUNTU-CVE-2022-2503","UBUNTU-CVE-2022-2873","UBUNTU-CVE-2022-2959"],"upstream":["CVE-2021-33061","CVE-2022-1012","CVE-2022-1729","CVE-2022-1852","CVE-2022-1943","CVE-2022-1973","CVE-2022-2503","CVE-2022-2873","CVE-2022-2959","UBUNTU-CVE-2021-33061","UBUNTU-CVE-2022-1012","UBUNTU-CVE-2022-1729","UBUNTU-CVE-2022-1852","UBUNTU-CVE-2022-1943","UBUNTU-CVE-2022-1973","UBUNTU-CVE-2022-2503","UBUNTU-CVE-2022-2873","UBUNTU-CVE-2022-2959"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5602-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33061"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1729"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1852"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1943"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1973"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2503"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2873"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2959"}],"affected":[{"package":{"name":"linux-raspi","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi@5.15.0-1014.16?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1014.16"}]}],"versions":["5.13.0-1008.9","5.15.0-1002.2","5.15.0-1003.3","5.15.0-1004.4","5.15.0-1005.5","5.15.0-1006.6","5.15.0-1008.8","5.15.0-1011.13","5.15.0-1012.14","5.15.0-1013.15"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-5.15.0-1014-raspi","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-buildinfo-5.15.0-1014-raspi-nolpae","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-headers-5.15.0-1014-raspi","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-headers-5.15.0-1014-raspi-nolpae","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-image-5.15.0-1014-raspi","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-image-5.15.0-1014-raspi-nolpae","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-modules-5.15.0-1014-raspi","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-modules-5.15.0-1014-raspi-nolpae","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-modules-extra-5.15.0-1014-raspi","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-modules-extra-5.15.0-1014-raspi-nolpae","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-raspi-headers-5.15.0-1014","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-raspi-tools-5.15.0-1014","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-tools-5.15.0-1014-raspi","binary_version":"5.15.0-1014.16"},{"binary_name":"linux-tools-5.15.0-1014-raspi-nolpae","binary_version":"5.15.0-1014.16"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5602-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-33061"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1012"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-1729"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1852"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1943"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1973"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2503"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2873"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2959"}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.3"}