First published: Wed Apr 09 2025(Updated: )
Demi Marie Obenour and Simon Gaiser discovered that several Xen para- virtualization device frontends did not properly restrict the access rights of device backends. An attacker could possibly use a malicious Xen backend to gain access to memory pages of a guest VM or cause a denial of service in the guest. (CVE-2022-23041) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems:
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-1141-oracle | <4.15.0-1141.152 | 4.15.0-1141.152 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1162-kvm | <4.15.0-1162.167 | 4.15.0-1162.167 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1172-gcp | <4.15.0-1172.189 | 4.15.0-1172.189 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1179-aws | <4.15.0-1179.192 | 4.15.0-1179.192 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1187-azure | <4.15.0-1187.202 | 4.15.0-1187.202 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-236-generic | <4.15.0-236.248 | 4.15.0-236.248 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-236-lowlatency | <4.15.0-236.248 | 4.15.0-236.248 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-aws-lts-18.04 | <4.15.0.1179.177 | 4.15.0.1179.177 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-azure-lts-18.04 | <4.15.0.1187.155 | 4.15.0.1187.155 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-gcp-lts-18.04 | <4.15.0.1172.185 | 4.15.0.1172.185 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-generic | <4.15.0.236.220 | 4.15.0.236.220 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-kvm | <4.15.0.1162.153 | 4.15.0.1162.153 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-lowlatency | <4.15.0.236.220 | 4.15.0.236.220 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-oracle-lts-18.04 | <4.15.0.1141.146 | 4.15.0.1141.146 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-virtual | <4.15.0.236.220 | 4.15.0.236.220 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1141-oracle | <4.15.0-1141.152~16.04.1 | 4.15.0-1141.152~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1172-gcp | <4.15.0-1172.189~16.04.1 | 4.15.0-1172.189~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1179-aws | <4.15.0-1179.192~16.04.1 | 4.15.0-1179.192~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1187-azure | <4.15.0-1187.202~16.04.1 | 4.15.0-1187.202~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-236-generic | <4.15.0-236.248~16.04.1 | 4.15.0-236.248~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-236-lowlatency | <4.15.0-236.248~16.04.1 | 4.15.0-236.248~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-aws-hwe | <4.15.0.1179.192~16.04.1 | 4.15.0.1179.192~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-azure | <4.15.0.1187.202~16.04.1 | 4.15.0.1187.202~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-gcp | <4.15.0.1172.189~16.04.1 | 4.15.0.1172.189~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-generic-hwe-16.04 | <4.15.0.236.248~16.04.1 | 4.15.0.236.248~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-gke | <4.15.0.1172.189~16.04.1 | 4.15.0.1172.189~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-lowlatency-hwe-16.04 | <4.15.0.236.248~16.04.1 | 4.15.0.236.248~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-oem | <4.15.0.236.248~16.04.1 | 4.15.0.236.248~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-oracle | <4.15.0.1141.152~16.04.1 | 4.15.0.1141.152~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-virtual-hwe-16.04 | <4.15.0.236.248~16.04.1 | 4.15.0.236.248~16.04.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/linux-image-4.15.0-1187-azure | <4.15.0-1187.202~14.04.1 | 4.15.0-1187.202~14.04.1 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-azure | <4.15.0.1187.202~14.04.1 | 4.15.0.1187.202~14.04.1 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-7428-1 is considered high due to potential unauthorized access and denial of service risks.
To fix USN-7428-1, you should update to the specified secure versions of the respective packages for Ubuntu 18.04 or 16.04.
Affected packages in USN-7428-1 include multiple versions of linux-image packages for both Ubuntu 18.04 and 16.04.
Yes, USN-7428-1 can affect virtualized environments by allowing attackers to gain access to the memory pages of guest VMs.
More information about USN-7428-1 can be found in the Ubuntu security notices or advisories.