First published: Thu Jan 12 2023(Updated: )
It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-43945) Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42896) It was discovered that the Xen netback driver in the Linux kernel did not properly handle packets structured in certain ways. An attacker in a guest VM could possibly use this to cause a denial of service (host NIC availability). (CVE-2022-3643) It was discovered that an integer overflow vulnerability existed in the Bluetooth subsystem in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2022-45934)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-236-generic | <4.4.0-236.270 | 4.4.0-236.270 |
=16.04 | ||
All of | ||
ubuntu/linux-image-generic | <4.4.0.236.242 | 4.4.0.236.242 |
=16.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-lts-xenial | <4.4.0.236.242 | 4.4.0.236.242 |
=16.04 | ||
All of | ||
ubuntu/linux-image-virtual-lts-xenial | <4.4.0.236.242 | 4.4.0.236.242 |
=16.04 | ||
All of | ||
ubuntu/linux-image-virtual | <4.4.0.236.242 | 4.4.0.236.242 |
=16.04 | ||
All of | ||
ubuntu/linux-image-generic-lts-xenial | <4.4.0.236.242 | 4.4.0.236.242 |
=16.04 | ||
All of | ||
ubuntu/linux-image-kvm | <4.4.0.1116.113 | 4.4.0.1116.113 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-1116-kvm | <4.4.0-1116.126 | 4.4.0-1116.126 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-236-lowlatency | <4.4.0-236.270 | 4.4.0-236.270 |
=16.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.4.0.236.242 | 4.4.0.236.242 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-236-generic | <4.4.0-236.270~14.04.1 | 4.4.0-236.270~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic-lts-xenial | <4.4.0.236.205 | 4.4.0.236.205 |
=14.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-lts-xenial | <4.4.0.236.205 | 4.4.0.236.205 |
=14.04 | ||
All of | ||
ubuntu/linux-image-aws | <4.4.0.1115.112 | 4.4.0.1115.112 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-1115-aws | <4.4.0-1115.121 | 4.4.0-1115.121 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-236-lowlatency | <4.4.0-236.270~14.04.1 | 4.4.0-236.270~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-virtual-lts-xenial | <4.4.0.236.205 | 4.4.0.236.205 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
CVE-2022-43945 has a high severity.
CVE-2022-43945 can cause a denial of service (system crash) or possibly execute arbitrary code.
Ubuntu 16.04 is affected by CVE-2022-43945.
The recommended remedy for CVE-2022-43945 on Ubuntu 16.04 is to update to version 4.4.0-236.270 of the linux-image-4.4.0-236-generic package.
You can find more information about CVE-2022-43945 at the following reference link: [CVE-2022-43945](https://ubuntu.com/security/CVE-2022-43945)