First published: Wed Apr 20 2022(Updated: )
David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-1015) Brendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver in the Linux kernel did not properly handle some error conditions. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2021-43976) Wenqing Liu discovered that the f2fs file system implementation in the Linux kernel did not properly validate inode types while performing garbage collection. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2021-44879) It was discovered that the UDF file system implementation in the Linux kernel could attempt to dereference a null pointer in some situations. An attacker could use this to construct a malicious UDF image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2022-0617) David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1016) Lyu Tao discovered that the NFS implementation in the Linux kernel did not properly handle requests to open a directory on a regular file. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-24448) It was discovered that the VirtIO Bluetooth driver in the Linux kernel did not properly deallocate memory in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2022-26878) It was discovered that the YAM AX.25 device driver in the Linux kernel did not properly deallocate memory in some error conditions. A local privileged attacker could use this to cause a denial of service (kernel memory exhaustion). (CVE-2022-24959)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.13.0-40-generic-64k | <5.13.0-40.45 | 5.13.0-40.45 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-virtual | <5.13.0.40.49 | 5.13.0.40.49 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-generic-64k | <5.13.0.40.49 | 5.13.0.40.49 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-generic | <5.13.0.40.49 | 5.13.0.40.49 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-40-lowlatency | <5.13.0-40.45 | 5.13.0-40.45 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-aws | <5.13.0.1022.23 | 5.13.0.1022.23 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1022-azure | <5.13.0-1022.26 | 5.13.0-1022.26 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1024-gcp | <5.13.0-1024.29 | 5.13.0-1024.29 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1025-raspi-nolpae | <5.13.0-1025.27 | 5.13.0-1025.27 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1021-kvm | <5.13.0-1021.22 | 5.13.0-1021.22 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-40-generic | <5.13.0-40.45 | 5.13.0-40.45 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-azure | <5.13.0.1022.22 | 5.13.0.1022.22 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-40-generic-lpae | <5.13.0-40.45 | 5.13.0-40.45 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.13.0.1025.30 | 5.13.0.1025.30 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-oem-20.04 | <5.13.0.40.49 | 5.13.0.40.49 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1022-aws | <5.13.0-1022.24 | 5.13.0-1022.24 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-gke | <5.13.0.1024.22 | 5.13.0.1024.22 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-gcp | <5.13.0.1024.22 | 5.13.0.1024.22 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-oracle | <5.13.0.1027.27 | 5.13.0.1027.27 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1027-oracle | <5.13.0-1027.32 | 5.13.0-1027.32 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-raspi | <5.13.0.1025.30 | 5.13.0.1025.30 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-1025-raspi | <5.13.0-1025.27 | 5.13.0-1025.27 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-kvm | <5.13.0.1021.21 | 5.13.0.1021.21 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-generic-lpae | <5.13.0.40.49 | 5.13.0.40.49 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-lowlatency | <5.13.0.40.49 | 5.13.0.40.49 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/linux-image-5.13.0-40-generic-64k | <5.13.0-40.45~20.04.1 | 5.13.0-40.45~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-virtual-hwe-20.04 | <5.13.0.40.45~20.04.25 | 5.13.0.40.45~20.04.25 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-intel | <5.13.0.1011.12 | 5.13.0.1011.12 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-gcp | <5.13.0.1024.29~20.04.1 | 5.13.0.1024.29~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.13.0-40-lowlatency | <5.13.0-40.45~20.04.1 | 5.13.0-40.45~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-aws | <5.13.0.1022.24~20.04.15 | 5.13.0.1022.24~20.04.15 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.13.0-1022-azure | <5.13.0-1022.26~20.04.1 | 5.13.0-1022.26~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-lowlatency-hwe-20.04 | <5.13.0.40.45~20.04.25 | 5.13.0.40.45~20.04.25 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.13.0-40-generic | <5.13.0-40.45~20.04.1 | 5.13.0-40.45~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.13.0-1024-gcp | <5.13.0-1024.29~20.04.1 | 5.13.0-1024.29~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-generic-hwe-20.04 | <5.13.0.40.45~20.04.25 | 5.13.0.40.45~20.04.25 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-azure | <5.13.0.1022.26~20.04.11 | 5.13.0.1022.26~20.04.11 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.13.0-40-generic-lpae | <5.13.0-40.45~20.04.1 | 5.13.0-40.45~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.13.0-1022-aws | <5.13.0-1022.24~20.04.1 | 5.13.0-1022.24~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oracle | <5.13.0.1027.32~20.04.1 | 5.13.0.1027.32~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-generic-lpae-hwe-20.04 | <5.13.0.40.45~20.04.25 | 5.13.0.40.45~20.04.25 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.13.0-1027-oracle | <5.13.0-1027.32~20.04.1 | 5.13.0-1027.32~20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.13.0-1011-intel | <5.13.0-1011.11 | 5.13.0-1011.11 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-generic-64k-hwe-20.04 | <5.13.0.40.45~20.04.25 | 5.13.0.40.45~20.04.25 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)