First published: Wed Aug 10 2022(Updated: )
Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2588) It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2586) It was discovered that the implementation of POSIX timers in the Linux kernel did not properly clean up timers in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2585) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) Felix Fu discovered that the Sun RPC implementation in the Linux kernel did not properly handle socket states, leading to a use-after-free vulnerability. A remote attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-28893) Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64 processors, the branch predictor could by mis-trained for return instructions in certain circumstances. A local attacker could possibly use this to expose sensitive information. (CVE-2022-29900) Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64 processors, the Linux kernel's protections against speculative branch target injection attacks were insufficient in some circumstances. A local attacker could possibly use this to expose sensitive information. (CVE-2022-29901) Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel did not properly perform data validation. A local attacker could use this to escalate privileges in certain situations. (CVE-2022-34918)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.15.0-1016-kvm | <5.15.0-1016.19 | 5.15.0-1016.19 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1012-ibm | <5.15.0-1012.14 | 5.15.0-1012.14 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1016-gcp | <5.15.0-1016.21 | 5.15.0-1016.21 |
=22.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.15.0.1017.17 | 5.15.0.1017.17 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1013-raspi-nolpae | <5.15.0-1013.15 | 5.15.0-1013.15 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gke-5.15 | <5.15.0.1014.17 | 5.15.0.1014.17 |
=22.04 | ||
All of | ||
ubuntu/linux-image-ibm | <5.15.0.1012.11 | 5.15.0.1012.11 |
=22.04 | ||
All of | ||
ubuntu/linux-image-azure | <5.15.0.1017.16 | 5.15.0.1017.16 |
=22.04 | ||
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.15.0.1013.12 | 5.15.0.1013.12 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1017-aws | <5.15.0-1017.21 | 5.15.0-1017.21 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gke | <5.15.0.1014.17 | 5.15.0.1014.17 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.15.0.1016.14 | 5.15.0.1016.14 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1014-gke | <5.15.0-1014.17 | 5.15.0-1014.17 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1016-oracle | <5.15.0-1016.20 | 5.15.0-1016.20 |
=22.04 | ||
All of | ||
ubuntu/linux-image-oracle | <5.15.0.1016.14 | 5.15.0.1016.14 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1013-raspi | <5.15.0-1013.15 | 5.15.0-1013.15 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1017-azure | <5.15.0-1017.20 | 5.15.0-1017.20 |
=22.04 | ||
All of | ||
ubuntu/linux-image-raspi | <5.15.0.1013.12 | 5.15.0.1013.12 |
=22.04 | ||
All of | ||
ubuntu/linux-image-kvm | <5.15.0.1016.14 | 5.15.0.1016.14 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1017-azure | <5.15.0-1017.20~20.04.1 | 5.15.0-1017.20~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-azure | <5.15.0.1017.20~20.04.10 | 5.15.0.1017.20~20.04.10 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1017-aws | <5.15.0-1017.21~20.04.1 | 5.15.0-1017.21~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1016-gcp | <5.15.0-1016.21~20.04.1 | 5.15.0-1016.21~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.15.0.1017.21~20.04.9 | 5.15.0.1017.21~20.04.9 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.15.0.1016.21~20.04.1 | 5.15.0.1016.21~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-gke-5.15 | <5.15.0.1014.17~20.04.1 | 5.15.0.1014.17~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1014-gke | <5.15.0-1014.17~20.04.1 | 5.15.0-1014.17~20.04.1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is USN-5566-1.
The severity level of USN-5566-1 is not mentioned in the description. It is recommended to check the referenced link for more information.
This vulnerability can be exploited by a local attacker to cause a denial of service or execute arbitrary code.
The affected software for USN-5566-1 is the Linux kernel with specific versions mentioned in the description.
To fix the vulnerability in USN-5566-1, update the affected Linux kernel packages to the recommended versions mentioned in the description.