USN-7179-4

Source
https://ubuntu.com/security/notices/USN-7179-4
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7179-4.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7179-4
Related
Published
2025-01-27T19:04:25.680947Z
Modified
2025-01-27T19:04:25.680947Z
Summary
linux-xilinx-zynqmp vulnerabilities
Details

Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12351)

Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information (kernel memory). (CVE-2020-12352)

Andy Nguyen discovered that the Bluetooth HCI event packet parser in the Linux kernel did not properly handle event advertisements of certain sizes, leading to a heap-based buffer overflow. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-24490)

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPU drivers; - Media drivers; - Network drivers; - SMB network file system; - Bluetooth subsystem; - Amateur Radio drivers; - Network traffic control; - VMware vSockets driver; (CVE-2024-43904, CVE-2024-35963, CVE-2024-35967, CVE-2024-40973, CVE-2024-26822, CVE-2024-35965, CVE-2024-40910, CVE-2024-38553, CVE-2024-53057, CVE-2024-50264, CVE-2024-35966)

References

Affected packages

Ubuntu:22.04:LTS / linux-xilinx-zynqmp

Package

Name
linux-xilinx-zynqmp
Purl
pkg:deb/ubuntu/linux-xilinx-zynqmp@5.15.0-1041.45?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1041.45

Affected versions

5.*

5.15.0-1022.26
5.15.0-1023.27
5.15.0-1025.29
5.15.0-1027.31
5.15.0-1030.34
5.15.0-1031.35
5.15.0-1035.39
5.15.0-1036.40
5.15.0-1037.41
5.15.0-1038.42
5.15.0-1039.43

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-buildinfo-5.15.0-1041-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-headers-5.15.0-1041-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-image-5.15.0-1041-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-image-5.15.0-1041-xilinx-zynqmp-dbgsym"
        },
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-modules-5.15.0-1041-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-tools-5.15.0-1041-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1041"
        },
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1041"
        },
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-xilinx-zynqmp-tools-common"
        },
        {
            "binary_version": "5.15.0-1041.45",
            "binary_name": "linux-xilinx-zynqmp-tools-host"
        }
    ]
}