{"id":"USN-5644-1","summary":"linux-gcp-5.15 vulnerabilities","details":"\nIt was discovered that the framebuffer driver on the Linux kernel did not\nverify size limits when changing font or screen size, leading to an out-of-\nbounds write. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2021-33655)\n\nDuoming Zhou discovered that race conditions existed in the timer handling\nimplementation of the Linux kernel's Rose X.25 protocol layer, resulting in\nuse-after-free vulnerabilities. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2022-2318)\n\nRoger Pau Monné discovered that the Xen virtual block driver in the Linux\nkernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-26365)\n\nRoger Pau Monné discovered that the Xen paravirtualization frontend in the\nLinux kernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-33740)\n\nIt was discovered that the Xen paravirtualization frontend in the Linux\nkernel incorrectly shared unrelated data when communicating with certain\nbackends. A local attacker could use this to cause a denial of service\n(guest crash) or expose sensitive information (guest kernel memory).\n(CVE-2022-33741, CVE-2022-33742)\n\nJan Beulich discovered that the Xen network device frontend driver in the\nLinux kernel incorrectly handled socket buffers (skb) references when\ncommunicating with certain backends. A local attacker could use this to\ncause a denial of service (guest crash). (CVE-2022-33743)\n\nOleksandr Tyshchenko discovered that the Xen paravirtualization platform in\nthe Linux kernel on ARM platforms contained a race condition in certain\nsituations. An attacker in a guest VM could use this to cause a denial of\nservice in the host OS. (CVE-2022-33744)\n\nIt was discovered that the virtio RPMSG bus driver in the Linux kernel\ncontained a double-free vulnerability in certain error conditions. A local\nattacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2022-34494, CVE-2022-34495)\n\nDomingo Dirutigliano and Nicola Guerrera discovered that the netfilter\nsubsystem in the Linux kernel did not properly handle rules that truncated\npackets below the packet header size. When such rules are in place, a\nremote attacker could possibly use this to cause a denial of service\n(system crash). (CVE-2022-36946)\n\n","modified":"2026-02-10T04:42:47Z","published":"2022-09-27T18:08:07Z","related":["UBUNTU-CVE-2021-33655","UBUNTU-CVE-2022-2318","UBUNTU-CVE-2022-26365","UBUNTU-CVE-2022-33740","UBUNTU-CVE-2022-33741","UBUNTU-CVE-2022-33742","UBUNTU-CVE-2022-33743","UBUNTU-CVE-2022-33744","UBUNTU-CVE-2022-34494","UBUNTU-CVE-2022-34495","UBUNTU-CVE-2022-36946"],"upstream":["CVE-2021-33655","CVE-2022-2318","CVE-2022-26365","CVE-2022-33740","CVE-2022-33741","CVE-2022-33742","CVE-2022-33743","CVE-2022-33744","CVE-2022-34494","CVE-2022-34495","CVE-2022-36946","UBUNTU-CVE-2021-33655","UBUNTU-CVE-2022-2318","UBUNTU-CVE-2022-26365","UBUNTU-CVE-2022-33740","UBUNTU-CVE-2022-33741","UBUNTU-CVE-2022-33742","UBUNTU-CVE-2022-33743","UBUNTU-CVE-2022-33744","UBUNTU-CVE-2022-34494","UBUNTU-CVE-2022-34495","UBUNTU-CVE-2022-36946"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5644-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33655"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2318"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26365"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33740"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33741"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33742"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33743"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33744"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-34494"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-34495"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36946"}],"affected":[{"package":{"name":"linux-gcp-5.15","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-5.15@5.15.0-1018.24~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-1018.24~20.04.1"}]}],"versions":["5.15.0-1006.9~20.04.1","5.15.0-1012.17~20.04.1","5.15.0-1013.18~20.04.1","5.15.0-1016.21~20.04.1","5.15.0-1017.23~20.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.15.0-1018.24~20.04.1","binary_name":"linux-buildinfo-5.15.0-1018-gcp"},{"binary_version":"5.15.0-1018.24~20.04.1","binary_name":"linux-gcp-5.15-headers-5.15.0-1018"},{"binary_version":"5.15.0-1018.24~20.04.1","binary_name":"linux-gcp-5.15-tools-5.15.0-1018"},{"binary_version":"5.15.0-1018.24~20.04.1","binary_name":"linux-headers-5.15.0-1018-gcp"},{"binary_version":"5.15.0-1018.24~20.04.1","binary_name":"linux-image-unsigned-5.15.0-1018-gcp"},{"binary_version":"5.15.0-1018.24~20.04.1","binary_name":"linux-modules-5.15.0-1018-gcp"},{"binary_version":"5.15.0-1018.24~20.04.1","binary_name":"linux-modules-extra-5.15.0-1018-gcp"},{"binary_version":"5.15.0-1018.24~20.04.1","binary_name":"linux-modules-iwlwifi-5.15.0-1018-gcp"},{"binary_version":"5.15.0-1018.24~20.04.1","binary_name":"linux-tools-5.15.0-1018-gcp"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-33655"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-2318"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-26365"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33740"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33741"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33742"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33743"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33744"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-34494"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-34495"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36946"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5644-1.json"}}],"schema_version":"1.7.3"}