First published: Thu May 12 2022(Updated: )
Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2021-26401) Demi Marie Obenour and Simon Gaiser discovered that several Xen para- virtualization device frontends did not properly restrict the access rights of device backends. An attacker could possibly use a malicious Xen backend to gain access to memory pages of a guest VM or cause a denial of service in the guest. (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23042) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) It was discovered that the USB gadget subsystem in the Linux kernel did not properly validate interface descriptor requests. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-25258) It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in the Linux kernel did not properly validate the size of the RNDIS_MSG_SET command. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-25375) It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490) It was discovered that the USB SR9700 ethernet device driver for the Linux kernel did not properly validate the length of requests from the device. A physically proximate attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-26966) It was discovered that the Xilinx USB2 device gadget driver in the Linux kernel did not properly validate endpoint indices from the host. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-27223)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.15.0-1127-snapdragon | <4.15.0-1127.136 | 4.15.0-1127.136 |
=18.04 | ||
All of | ||
ubuntu/linux-image-virtual | <4.15.0.177.166 | 4.15.0.177.166 |
=18.04 | ||
All of | ||
ubuntu/linux-image-aws-lts-18.04 | <4.15.0.1128.131 | 4.15.0.1128.131 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic | <4.15.0.177.166 | 4.15.0.177.166 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1138-azure | <4.15.0-1138.151 | 4.15.0-1138.151 |
=18.04 | ||
All of | ||
ubuntu/linux-image-oracle-lts-18.04 | <4.15.0.1093.103 | 4.15.0.1093.103 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1114-kvm | <4.15.0-1114.117 | 4.15.0-1114.117 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1128-aws | <4.15.0-1128.137 | 4.15.0-1128.137 |
=18.04 | ||
All of | ||
ubuntu/linux-image-snapdragon | <4.15.0.1127.130 | 4.15.0.1127.130 |
=18.04 | ||
All of | ||
ubuntu/linux-image-azure-lts-18.04 | <4.15.0.1138.111 | 4.15.0.1138.111 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-177-generic-lpae | <4.15.0-177.186 | 4.15.0-177.186 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1042-dell300x | <4.15.0-1042.47 | 4.15.0-1042.47 |
=18.04 | ||
All of | ||
ubuntu/linux-image-dell300x | <4.15.0.1042.44 | 4.15.0.1042.44 |
=18.04 | ||
All of | ||
ubuntu/linux-image-gcp-lts-18.04 | <4.15.0.1122.141 | 4.15.0.1122.141 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1122-gcp | <4.15.0-1122.136 | 4.15.0-1122.136 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1093-oracle | <4.15.0-1093.102 | 4.15.0-1093.102 |
=18.04 | ||
All of | ||
ubuntu/linux-image-kvm | <4.15.0.1114.110 | 4.15.0.1114.110 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-177-generic | <4.15.0-177.186 | 4.15.0-177.186 |
=18.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <4.15.0.177.166 | 4.15.0.177.166 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-177-lowlatency | <4.15.0-177.186 | 4.15.0-177.186 |
=18.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.15.0.177.166 | 4.15.0.177.166 |
=18.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1138-azure | <4.15.0-1138.151~16.04.1 | 4.15.0-1138.151~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-16.04 | <4.15.0.177.169 | 4.15.0.177.169 |
=16.04 | ||
All of | ||
ubuntu/linux-image-oem | <4.15.0.177.169 | 4.15.0.177.169 |
=16.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.15.0.1138.128 | 4.15.0.1138.128 |
=16.04 | ||
All of | ||
ubuntu/linux-image-gke | <4.15.0.1122.123 | 4.15.0.1122.123 |
=16.04 | ||
All of | ||
ubuntu/linux-image-gcp | <4.15.0.1122.123 | 4.15.0.1122.123 |
=16.04 | ||
All of | ||
ubuntu/linux-image-aws-hwe | <4.15.0.1128.118 | 4.15.0.1128.118 |
=16.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-16.04 | <4.15.0.177.169 | 4.15.0.177.169 |
=16.04 | ||
All of | ||
ubuntu/linux-image-oracle | <4.15.0.1093.81 | 4.15.0.1093.81 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1122-gcp | <4.15.0-1122.136~16.04.1 | 4.15.0-1122.136~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-16.04 | <4.15.0.177.169 | 4.15.0.177.169 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1093-oracle | <4.15.0-1093.102~16.04.1 | 4.15.0-1093.102~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-177-generic | <4.15.0-177.186~16.04.1 | 4.15.0-177.186~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1128-aws-hwe | <4.15.0-1128.137~16.04.1 | 4.15.0-1128.137~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-177-lowlatency | <4.15.0-177.186~16.04.1 | 4.15.0-177.186~16.04.1 |
=16.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1138-azure | <4.15.0-1138.151~14.04.1 | 4.15.0-1138.151~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.15.0.1138.110 | 4.15.0.1138.110 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)