First published: Wed Oct 26 2022(Updated: )
Selim Enes Karaduman discovered that a race condition existed in the General notification queue implementation of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1882) Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information. (CVE-2022-26373) Eric Biggers discovered that a use-after-free vulnerability existed in the io_uring subsystem in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3176) It was discovered that the Netlink Transformation (XFRM) subsystem in the Linux kernel contained a reference counting error. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-36879) Jann Horn discovered that the KVM subsystem in the Linux kernel did not properly handle TLB flush operations in some situations. A local attacker in a guest VM could use this to cause a denial of service (guest crash) or possibly execute arbitrary code in the guest kernel. (CVE-2022-39189)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-intel-iotg | <5.15.0.1017.18 | 5.15.0.1017.18 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1017-intel-iotg | <5.15.0-1017.22 | 5.15.0-1017.22 |
=22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID is CVE-2022-18…
The severity of this vulnerability is not specified in the provided information.
A local attacker can exploit this vulnerability to cause a denial of service (system crash) or possibly execute arbitrary code.
The Linux kernel packages 'linux-image-intel-iotg' and 'linux-image-5.15.0-1017-intel-iotg' in Ubuntu 22.04 are affected by this vulnerability.
To fix this vulnerability, update the 'linux-image-intel-iotg' package to version 5.15.0.1017.18 or later, or update the 'linux-image-5.15.0-1017-intel-iotg' package to version 5.15.0-1017.22 or later, depending on the package you are using.