First published: Wed Jun 08 2022(Updated: )
It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. (CVE-2022-1158) Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. A local attacker could use this to cause a denial of service or execute arbitrary code. (CVE-2022-1972) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) It was discovered that the EMS CAN/USB interface implementation in the Linux kernel contained a double-free vulnerability when handling certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-28390)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-virtual | <5.13.0.48.56 | 5.13.0.48.56 |
=21.10 | ||
All of | ||
ubuntu/linux-image-generic-64k | <5.13.0.48.56 | 5.13.0.48.56 |
=21.10 | ||
All of | ||
ubuntu/linux-image-generic | <5.13.0.48.56 | 5.13.0.48.56 |
=21.10 | ||
All of | ||
ubuntu/linux-image-aws | <5.13.0.1028.28 | 5.13.0.1028.28 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1033-oracle | <5.13.0-1033.39 | 5.13.0-1033.39 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1028-azure | <5.13.0-1028.33 | 5.13.0-1028.33 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-48-generic-lpae | <5.13.0-48.54 | 5.13.0-48.54 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-48-lowlatency | <5.13.0-48.54 | 5.13.0-48.54 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1030-gcp | <5.13.0-1030.36 | 5.13.0-1030.36 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1031-raspi | <5.13.0-1031.34 | 5.13.0-1031.34 |
=21.10 | ||
All of | ||
ubuntu/linux-image-azure | <5.13.0.1028.27 | 5.13.0.1028.27 |
=21.10 | ||
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.13.0.1031.35 | 5.13.0.1031.35 |
=21.10 | ||
All of | ||
ubuntu/linux-image-oem-20.04 | <5.13.0.48.56 | 5.13.0.48.56 |
=21.10 | ||
All of | ||
ubuntu/linux-image-gke | <5.13.0.1030.27 | 5.13.0.1030.27 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1031-raspi-nolpae | <5.13.0-1031.34 | 5.13.0-1031.34 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-48-generic-64k | <5.13.0-48.54 | 5.13.0-48.54 |
=21.10 | ||
All of | ||
ubuntu/linux-image-gcp | <5.13.0.1030.27 | 5.13.0.1030.27 |
=21.10 | ||
All of | ||
ubuntu/linux-image-oracle | <5.13.0.1033.32 | 5.13.0.1033.32 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1028-aws | <5.13.0-1028.31 | 5.13.0-1028.31 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-48-generic | <5.13.0-48.54 | 5.13.0-48.54 |
=21.10 | ||
All of | ||
ubuntu/linux-image-raspi | <5.13.0.1031.35 | 5.13.0.1031.35 |
=21.10 | ||
All of | ||
ubuntu/linux-image-kvm | <5.13.0.1027.26 | 5.13.0.1027.26 |
=21.10 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.13.0.48.56 | 5.13.0.48.56 |
=21.10 | ||
All of | ||
ubuntu/linux-image-5.13.0-1027-kvm | <5.13.0-1027.29 | 5.13.0-1027.29 |
=21.10 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.13.0.48.56 | 5.13.0.48.56 |
=21.10 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-20.04 | <5.13.0.48.54~20.04.30 | 5.13.0.48.54~20.04.30 |
=20.04 | ||
All of | ||
ubuntu/linux-image-intel | <5.13.0.1014.14 | 5.13.0.1014.14 |
=20.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.13.0.1028.31~20.04.22 | 5.13.0.1028.31~20.04.22 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-1033-oracle | <5.13.0-1033.39~20.04.1 | 5.13.0-1033.39~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-1028-azure | <5.13.0-1028.33~20.04.1 | 5.13.0-1028.33~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-20.04 | <5.13.0.48.54~20.04.30 | 5.13.0.48.54~20.04.30 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-20.04 | <5.13.0.48.54~20.04.30 | 5.13.0.48.54~20.04.30 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-48-lowlatency | <5.13.0-48.54~20.04.1 | 5.13.0-48.54~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-1030-gcp | <5.13.0-1030.36~20.04.1 | 5.13.0-1030.36~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-azure | <5.13.0.1028.33~20.04.17 | 5.13.0.1028.33~20.04.17 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-48-generic-64k | <5.13.0-48.54~20.04.1 | 5.13.0-48.54~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.13.0.1030.36~20.04.1 | 5.13.0.1030.36~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oracle | <5.13.0.1033.39~20.04.1 | 5.13.0.1033.39~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-1028-aws | <5.13.0-1028.31~20.04.1 | 5.13.0-1028.31~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-hwe-20.04 | <5.13.0.48.54~20.04.30 | 5.13.0.48.54~20.04.30 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-48-generic | <5.13.0-48.54~20.04.1 | 5.13.0-48.54~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-64k-hwe-20.04 | <5.13.0.48.54~20.04.30 | 5.13.0.48.54~20.04.30 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-48-generic-lpae | <5.13.0-48.54~20.04.1 | 5.13.0-48.54~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.13.0-1014-intel | <5.13.0-1014.15 | 5.13.0-1014.15 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)