{"id":"USN-5679-1","summary":"linux-aws-hwe vulnerabilities","details":"It was discovered that the SUNRPC RDMA protocol implementation in the Linux\nkernel did not properly calculate the header size of a RPC message payload.\nA local attacker could use this to expose sensitive information (kernel\nmemory). (CVE-2022-0812)\n\nMoshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation\nin the Linux kernel did not provide sufficient randomization when\ncalculating port offsets. An attacker could possibly use this to expose\nsensitive information. (CVE-2022-1012, CVE-2022-32296)\n\nDuoming Zhou discovered that race conditions existed in the timer handling\nimplementation of the Linux kernel's Rose X.25 protocol layer, resulting in\nuse-after-free vulnerabilities. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2022-2318)\n\nRoger Pau Monné discovered that the Xen virtual block driver in the Linux\nkernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-26365)\n\nRoger Pau Monné discovered that the Xen paravirtualization frontend in the\nLinux kernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-33740)\n\nIt was discovered that the Xen paravirtualization frontend in the Linux\nkernel incorrectly shared unrelated data when communicating with certain\nbackends. A local attacker could use this to cause a denial of service\n(guest crash) or expose sensitive information (guest kernel memory).\n(CVE-2022-33741, CVE-2022-33742)\n\nOleksandr Tyshchenko discovered that the Xen paravirtualization platform in\nthe Linux kernel on ARM platforms contained a race condition in certain\nsituations. An attacker in a guest VM could use this to cause a denial of\nservice in the host OS. (CVE-2022-33744)\n\n","modified":"2026-02-10T04:42:48Z","published":"2022-10-13T20:04:56Z","related":["UBUNTU-CVE-2022-0812","UBUNTU-CVE-2022-1012","UBUNTU-CVE-2022-2318","UBUNTU-CVE-2022-26365","UBUNTU-CVE-2022-32296","UBUNTU-CVE-2022-33740","UBUNTU-CVE-2022-33741","UBUNTU-CVE-2022-33742","UBUNTU-CVE-2022-33744"],"upstream":["CVE-2022-0812","CVE-2022-1012","CVE-2022-2318","CVE-2022-26365","CVE-2022-32296","CVE-2022-33740","CVE-2022-33741","CVE-2022-33742","CVE-2022-33744","UBUNTU-CVE-2022-0812","UBUNTU-CVE-2022-1012","UBUNTU-CVE-2022-2318","UBUNTU-CVE-2022-26365","UBUNTU-CVE-2022-32296","UBUNTU-CVE-2022-33740","UBUNTU-CVE-2022-33741","UBUNTU-CVE-2022-33742","UBUNTU-CVE-2022-33744"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5679-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0812"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2318"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26365"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32296"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33740"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33741"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33742"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33744"}],"affected":[{"package":{"name":"linux-aws-hwe","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-hwe@4.15.0-1142.154~16.04.1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1142.154~16.04.1"}]}],"versions":["4.15.0-1030.31~16.04.1","4.15.0-1031.33~16.04.1","4.15.0-1032.34~16.04.1","4.15.0-1033.35~16.04.1","4.15.0-1035.37~16.04.1","4.15.0-1036.38~16.04.1","4.15.0-1039.41~16.04.1","4.15.0-1040.42~16.04.1","4.15.0-1041.43~16.04.1","4.15.0-1043.45~16.04.1","4.15.0-1044.46~16.04.1","4.15.0-1045.47~16.04.1","4.15.0-1047.49~16.04.1","4.15.0-1048.50~16.04.1","4.15.0-1050.52~16.04.1","4.15.0-1051.53~16.04.1","4.15.0-1052.54~16.04.1","4.15.0-1054.56~16.04.1","4.15.0-1056.58~16.04.1","4.15.0-1057.59~16.04.1","4.15.0-1058.60~16.04.1","4.15.0-1060.62~16.04.1","4.15.0-1063.67~16.04.1","4.15.0-1065.69~16.04.1","4.15.0-1066.70~16.04.1","4.15.0-1067.71~16.04.1","4.15.0-1073.77~16.04.1","4.15.0-1074.78~16.04.1","4.15.0-1079.83~16.04.1","4.15.0-1080.84~16.04.1","4.15.0-1082.86~16.04.1","4.15.0-1083.87~16.04.1","4.15.0-1085.90~16.04.1","4.15.0-1088.93~16.04.1","4.15.0-1090.95~16.04.1","4.15.0-1091.96~16.04.1","4.15.0-1093.99~16.04.1","4.15.0-1094.101~16.04.1","4.15.0-1095.102~16.04.1","4.15.0-1096.103~16.04.1","4.15.0-1097.104~16.04.1","4.15.0-1098.105~16.04.1","4.15.0-1099.106~16.04.1","4.15.0-1102.109~16.04.1","4.15.0-1103.110~16.04.1","4.15.0-1106.113~16.04.1","4.15.0-1109.116~16.04.1","4.15.0-1110.117~16.04.1","4.15.0-1111.118~16.04.1","4.15.0-1112.119~16.04.1","4.15.0-1113.120~16.04.1","4.15.0-1115.122~16.04.1","4.15.0-1116.123~16.04.1","4.15.0-1118.125~16.04.1","4.15.0-1119.126~16.04.2","4.15.0-1120.128~16.04.1","4.15.0-1123.132~16.04.1","4.15.0-1124.133~16.04.1","4.15.0-1126.135~16.04.2","4.15.0-1127.136~16.04.1","4.15.0-1128.137~16.04.1","4.15.0-1130.139~16.04.1","4.15.0-1133.143~16.04.1","4.15.0-1136.147~16.04.1","4.15.0-1137.148~16.04.1","4.15.0-1139.150~16.04.1","4.15.0-1140.151~16.04.1","4.15.0-1141.152~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-aws-headers-4.15.0-1142","binary_version":"4.15.0-1142.154~16.04.1"},{"binary_name":"linux-aws-hwe-cloud-tools-4.15.0-1142","binary_version":"4.15.0-1142.154~16.04.1"},{"binary_name":"linux-aws-hwe-tools-4.15.0-1142","binary_version":"4.15.0-1142.154~16.04.1"},{"binary_name":"linux-buildinfo-4.15.0-1142-aws","binary_version":"4.15.0-1142.154~16.04.1"},{"binary_name":"linux-cloud-tools-4.15.0-1142-aws","binary_version":"4.15.0-1142.154~16.04.1"},{"binary_name":"linux-headers-4.15.0-1142-aws","binary_version":"4.15.0-1142.154~16.04.1"},{"binary_name":"linux-image-unsigned-4.15.0-1142-aws","binary_version":"4.15.0-1142.154~16.04.1"},{"binary_name":"linux-modules-4.15.0-1142-aws","binary_version":"4.15.0-1142.154~16.04.1"},{"binary_name":"linux-modules-extra-4.15.0-1142-aws","binary_version":"4.15.0-1142.154~16.04.1"},{"binary_name":"linux-tools-4.15.0-1142-aws","binary_version":"4.15.0-1142.154~16.04.1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5679-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-0812"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-1012"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-2318"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-26365"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-32296"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33740"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33741"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33742"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33744"}]}}}],"schema_version":"1.7.3"}