{"id":"USN-5572-2","summary":"linux-aws vulnerabilities","details":"\nRoger Pau Monné discovered that the Xen virtual block driver in the Linux\nkernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-26365)\n\nRoger Pau Monné discovered that the Xen paravirtualization frontend in the\nLinux kernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-33740)\n\nIt was discovered that the Xen paravirtualization frontend in the Linux\nkernel incorrectly shared unrelated data when communicating with certain\nbackends. A local attacker could use this to cause a denial of service\n(guest crash) or expose sensitive information (guest kernel memory).\n(CVE-2022-33741)\n\n","modified":"2026-02-10T04:42:45Z","published":"2022-08-30T13:48:13Z","related":["UBUNTU-CVE-2022-26365","UBUNTU-CVE-2022-33740","UBUNTU-CVE-2022-33741"],"upstream":["CVE-2022-26365","CVE-2022-33740","CVE-2022-33741","UBUNTU-CVE-2022-26365","UBUNTU-CVE-2022-33740","UBUNTU-CVE-2022-33741"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5572-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26365"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33740"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33741"}],"affected":[{"package":{"name":"linux-aws","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.4.0-1112.118?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1112.118"}]}],"versions":["4.4.0-1002.2","4.4.0-1003.3","4.4.0-1005.5","4.4.0-1006.6","4.4.0-1009.9","4.4.0-1010.10","4.4.0-1011.11","4.4.0-1012.12","4.4.0-1014.14","4.4.0-1016.16","4.4.0-1017.17","4.4.0-1019.19","4.4.0-1022.22","4.4.0-1023.23","4.4.0-1024.25","4.4.0-1025.26","4.4.0-1027.30","4.4.0-1028.31","4.4.0-1029.32","4.4.0-1031.34","4.4.0-1032.35","4.4.0-1034.37","4.4.0-1036.39","4.4.0-1037.40","4.4.0-1038.41","4.4.0-1039.42","4.4.0-1040.43","4.4.0-1042.45","4.4.0-1044.47","4.4.0-1045.48","4.4.0-1046.50","4.4.0-1048.52","4.4.0-1050.54","4.4.0-1052.56","4.4.0-1054.58","4.4.0-1055.59","4.4.0-1056.60","4.4.0-1058.62","4.4.0-1059.63","4.4.0-1060.64","4.4.0-1061.65","4.4.0-1062.66","4.4.0-1064.68","4.4.0-1065.69","4.4.0-1066.70","4.4.0-1067.71","4.4.0-1073.77","4.4.0-1074.78","4.4.0-1075.79","4.4.0-1076.80","4.4.0-1077.81","4.4.0-1078.82","4.4.0-1081.85","4.4.0-1082.86","4.4.0-1083.87","4.4.0-1085.89","4.4.0-1086.90","4.4.0-1087.91","4.4.0-1088.92","4.4.0-1090.94","4.4.0-1091.95","4.4.0-1092.96","4.4.0-1093.97","4.4.0-1094.99","4.4.0-1095.100","4.4.0-1096.101","4.4.0-1097.102","4.4.0-1098.103","4.4.0-1099.104","4.4.0-1101.106","4.4.0-1102.107","4.4.0-1103.108","4.4.0-1104.109","4.4.0-1107.113","4.4.0-1109.115","4.4.0-1110.116","4.4.0-1111.117"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"4.4.0-1112.118","binary_name":"linux-aws-cloud-tools-4.4.0-1112"},{"binary_version":"4.4.0-1112.118","binary_name":"linux-aws-headers-4.4.0-1112"},{"binary_version":"4.4.0-1112.118","binary_name":"linux-aws-tools-4.4.0-1112"},{"binary_version":"4.4.0-1112.118","binary_name":"linux-buildinfo-4.4.0-1112-aws"},{"binary_version":"4.4.0-1112.118","binary_name":"linux-cloud-tools-4.4.0-1112-aws"},{"binary_version":"4.4.0-1112.118","binary_name":"linux-headers-4.4.0-1112-aws"},{"binary_version":"4.4.0-1112.118","binary_name":"linux-image-4.4.0-1112-aws"},{"binary_version":"4.4.0-1112.118","binary_name":"linux-modules-4.4.0-1112-aws"},{"binary_version":"4.4.0-1112.118","binary_name":"linux-tools-4.4.0-1112-aws"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5572-2.json","cves_map":{"cves":[{"id":"CVE-2022-26365","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-33740","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-33741","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}}],"schema_version":"1.7.3"}