First published: Tue Mar 28 2023(Updated: )
It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-3669) It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. (CVE-2022-2196) Gerald Lee discovered that the USB Gadget file system implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-4382) It was discovered that the RNDIS USB driver in the Linux kernel contained an integer overflow vulnerability. A local attacker with physical access could plug in a malicious USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-23559)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-gkeop | <5.4.0.1066.64 | 5.4.0.1066.64 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1099-aws | <5.4.0-1099.107 | 5.4.0-1099.107 |
=20.04 | ||
All of | ||
ubuntu/linux-image-virtual | <5.4.0.146.144 | 5.4.0.146.144 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic | <5.4.0.146.144 | 5.4.0.146.144 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oem | <5.4.0.146.144 | 5.4.0.146.144 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1066-gkeop | <5.4.0-1066.70 | 5.4.0-1066.70 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1098-oracle | <5.4.0-1098.107 | 5.4.0-1098.107 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1105-azure | <5.4.0-1105.111 | 5.4.0-1105.111 |
=20.04 | ||
All of | ||
ubuntu/linux-image-ibm | <5.4.0.1046.72 | 5.4.0.1046.72 |
=20.04 | ||
All of | ||
ubuntu/linux-image-raspi | <5.4.0.1082.112 | 5.4.0.1082.112 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1088-kvm | <5.4.0-1088.94 | 5.4.0-1088.94 |
=20.04 | ||
All of | ||
ubuntu/linux-image-ibm-lts-20.04 | <5.4.0.1046.72 | 5.4.0.1046.72 |
=20.04 | ||
All of | ||
ubuntu/linux-image-azure-lts-20.04 | <5.4.0.1105.98 | 5.4.0.1105.98 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1096-gke | <5.4.0-1096.103 | 5.4.0-1096.103 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1102-gcp | <5.4.0-1102.111 | 5.4.0-1102.111 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-146-generic-lpae | <5.4.0-146.163 | 5.4.0-146.163 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gkeop-5.4 | <5.4.0.1066.64 | 5.4.0.1066.64 |
=20.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.4.0.146.144 | 5.4.0.146.144 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gcp-lts-20.04 | <5.4.0.1102.104 | 5.4.0.1102.104 |
=20.04 | ||
All of | ||
ubuntu/linux-image-aws-lts-20.04 | <5.4.0.1099.96 | 5.4.0.1099.96 |
=20.04 | ||
All of | ||
ubuntu/linux-image-raspi2 | <5.4.0.1082.112 | 5.4.0.1082.112 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oem-osp1 | <5.4.0.146.144 | 5.4.0.146.144 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gke | <5.4.0.1096.101 | 5.4.0.1096.101 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1082-raspi | <5.4.0-1082.93 | 5.4.0-1082.93 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oracle-lts-20.04 | <5.4.0.1098.91 | 5.4.0.1098.91 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-146-generic | <5.4.0-146.163 | 5.4.0-146.163 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1046-ibm | <5.4.0-1046.51 | 5.4.0-1046.51 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gke-5.4 | <5.4.0.1096.101 | 5.4.0.1096.101 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-146-lowlatency | <5.4.0-146.163 | 5.4.0-146.163 |
=20.04 | ||
All of | ||
ubuntu/linux-image-kvm | <5.4.0.1088.82 | 5.4.0.1088.82 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.4.0.146.144 | 5.4.0.146.144 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)