{"id":"USN-5979-1","summary":"linux-hwe-5.19 vulnerabilities","details":"It was discovered that the KVM VMX implementation in the Linux kernel did\nnot properly handle indirect branch prediction isolation between L1 and L2\nVMs. An attacker in a guest VM could use this to expose sensitive\ninformation from the host OS or other guest VMs. (CVE-2022-2196)\n\nIt was discovered that a race condition existed in the Xen network backend\ndriver in the Linux kernel when handling dropped packets in certain\ncircumstances. An attacker could use this to cause a denial of service\n(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)\n\nGerald Lee discovered that the USB Gadget file system implementation in the\nLinux kernel contained a race condition, leading to a use-after-free\nvulnerability in some situations. A local attacker could use this to cause\na denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2022-4382)\n\nJosé Oliveira and Rodrigo Branco discovered that the prctl syscall\nimplementation in the Linux kernel did not properly protect against\nindirect branch prediction attacks in some situations. A local attacker\ncould possibly use this to expose sensitive information. (CVE-2023-0045)\n\nIt was discovered that a use-after-free vulnerability existed in the\nAdvanced Linux Sound Architecture (ALSA) subsystem. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2023-0266)\n\nIt was discovered that the io_uring subsystem in the Linux kernel contained\na use-after-free vulnerability. A local attacker could possibly use this to\ncause a denial of service (system crash) or execute arbitrary code.\n(CVE-2023-0469)\n\nIt was discovered that the CIFS network file system implementation in the\nLinux kernel contained a user-after-free vulnerability. A local attacker\ncould possibly use this to cause a denial of service (system crash) or\nexecute arbitrary code. (CVE-2023-1195)\n\nIt was discovered that the RNDIS USB driver in the Linux kernel contained\nan integer overflow vulnerability. A local attacker with physical access\ncould plug in a malicious USB device to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2023-23559)\n\n","modified":"2026-02-10T04:43:02Z","published":"2023-03-28T16:23:40Z","related":["UBUNTU-CVE-2022-2196","UBUNTU-CVE-2022-42328","UBUNTU-CVE-2022-42329","UBUNTU-CVE-2022-4382","UBUNTU-CVE-2023-0045","UBUNTU-CVE-2023-0266","UBUNTU-CVE-2023-0469","UBUNTU-CVE-2023-1195","UBUNTU-CVE-2023-23559"],"upstream":["CVE-2022-2196","CVE-2022-42328","CVE-2022-42329","CVE-2022-4382","CVE-2023-0045","CVE-2023-0266","CVE-2023-0469","CVE-2023-1195","CVE-2023-23559","UBUNTU-CVE-2022-2196","UBUNTU-CVE-2022-42328","UBUNTU-CVE-2022-42329","UBUNTU-CVE-2022-4382","UBUNTU-CVE-2023-0045","UBUNTU-CVE-2023-0266","UBUNTU-CVE-2023-0469","UBUNTU-CVE-2023-1195","UBUNTU-CVE-2023-23559"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5979-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2196"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-4382"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-42328"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-42329"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0045"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0266"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0469"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1195"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-23559"}],"affected":[{"package":{"name":"linux-hwe-5.19","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-5.19@5.19.0-38.39~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.19.0-38.39~22.04.1"}]}],"versions":["5.19.0-28.29~22.04.1","5.19.0-32.33~22.04.1","5.19.0-35.36~22.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-buildinfo-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-buildinfo-5.19.0-38-generic-64k"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-buildinfo-5.19.0-38-generic-lpae"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-cloud-tools-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-headers-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-headers-5.19.0-38-generic-64k"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-headers-5.19.0-38-generic-lpae"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-hwe-5.19-cloud-tools-5.19.0-38"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-hwe-5.19-cloud-tools-common"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-hwe-5.19-headers-5.19.0-38"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-hwe-5.19-tools-5.19.0-38"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-hwe-5.19-tools-common"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-hwe-5.19-tools-host"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-image-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-image-5.19.0-38-generic-lpae"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-image-unsigned-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-image-unsigned-5.19.0-38-generic-64k"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-modules-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-modules-5.19.0-38-generic-64k"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-modules-5.19.0-38-generic-lpae"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-modules-extra-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-modules-ipu6-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-modules-ivsc-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-modules-iwlwifi-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-source-5.19.0"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-tools-5.19.0-38-generic"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-tools-5.19.0-38-generic-64k"},{"binary_version":"5.19.0-38.39~22.04.1","binary_name":"linux-tools-5.19.0-38-generic-lpae"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5979-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-2196","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-4382","severity":[{"score":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-42328","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-42329","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-0045","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2023-0266","severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2023-0469","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-1195","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-23559","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}