First published: Thu Nov 17 2022(Updated: )
It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-20422) Hsin-Wei Hung discovered that the BPF subsystem in the Linux kernel contained an out-of-bounds read vulnerability in the x86 JIT compiler. A local attacker could possibly use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2022-2905) Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978) Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028) It was discovered that the Netlink device interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3625) It was discovered that the IDT 77252 ATM PCI device driver in the Linux kernel did not properly remove any pending timers during device exit, resulting in a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-3635) Gwangun Jung discovered that the netfilter subsystem in the Linux kernel did not properly prevent binding to an already bound chain. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-39190) Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX storage controller driver in the Linux kernel did not properly handle certain structures. A local attacker could potentially use this to expose sensitive information (kernel memory). (CVE-2022-40768)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.15.0-1008-gkeop | <5.15.0-1008.12 | 5.15.0-1008.12 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gkeop | <5.15.0.1008.9 | 5.15.0.1008.9 |
=22.04 | ||
All of | ||
ubuntu/linux-image-virtual | <5.15.0.53.53 | 5.15.0.53.53 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1018-ibm | <5.15.0-1018.21 | 5.15.0-1018.21 |
=22.04 | ||
All of | ||
ubuntu/linux-image-generic-64k | <5.15.0.53.53 | 5.15.0.53.53 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-generic-lpae | <5.15.0-53.59 | 5.15.0-53.59 |
=22.04 | ||
All of | ||
ubuntu/linux-image-generic | <5.15.0.53.53 | 5.15.0.53.53 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-generic | <5.15.0-53.59 | 5.15.0-53.59 |
=22.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.15.0.1023.23 | 5.15.0.1023.23 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1022-gcp | <5.15.0-1022.29 | 5.15.0-1022.29 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gke-5.15 | <5.15.0.1020.21 | 5.15.0.1020.21 |
=22.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-22.04 | <5.15.0.53.48 | 5.15.0.53.48 |
=22.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-22.04 | <5.15.0.53.53 | 5.15.0.53.53 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gcp | <5.15.0.1022.19 | 5.15.0.1022.19 |
=22.04 | ||
All of | ||
ubuntu/linux-image-ibm | <5.15.0.1018.16 | 5.15.0.1018.16 |
=22.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-22.04 | <5.15.0.53.53 | 5.15.0.53.53 |
=22.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-64k | <5.15.0.53.48 | 5.15.0.53.48 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1021-kvm | <5.15.0-1021.26 | 5.15.0-1021.26 |
=22.04 | ||
All of | ||
ubuntu/linux-image-azure-lts-22.04 | <5.15.0.1023.22 | 5.15.0.1023.22 |
=22.04 | ||
All of | ||
ubuntu/linux-image-azure | <5.15.0.1023.22 | 5.15.0.1023.22 |
=22.04 | ||
All of | ||
ubuntu/linux-image-aws-lts-22.04 | <5.15.0.1023.23 | 5.15.0.1023.23 |
=22.04 | ||
All of | ||
ubuntu/linux-image-oem-20.04 | <5.15.0.53.53 | 5.15.0.53.53 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-lowlatency | <5.15.0-53.59 | 5.15.0-53.59 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gke | <5.15.0.1020.21 | 5.15.0.1020.21 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-generic-64k | <5.15.0-53.59 | 5.15.0-53.59 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1022-oracle | <5.15.0-1022.28 | 5.15.0-1022.28 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-lowlatency-64k | <5.15.0-53.59 | 5.15.0-53.59 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1023-azure | <5.15.0-1023.29 | 5.15.0-1023.29 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1023-aws | <5.15.0-1023.27 | 5.15.0-1023.27 |
=22.04 | ||
All of | ||
ubuntu/linux-image-gkeop-5.15 | <5.15.0.1008.9 | 5.15.0.1008.9 |
=22.04 | ||
All of | ||
ubuntu/linux-image-oracle | <5.15.0.1022.19 | 5.15.0.1022.19 |
=22.04 | ||
All of | ||
ubuntu/linux-image-generic-64k-hwe-22.04 | <5.15.0.53.53 | 5.15.0.53.53 |
=22.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1020-gke | <5.15.0-1020.25 | 5.15.0-1020.25 |
=22.04 | ||
All of | ||
ubuntu/linux-image-kvm | <5.15.0.1021.19 | 5.15.0.1021.19 |
=22.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.15.0.53.53 | 5.15.0.53.53 |
=22.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-hwe-22.04 | <5.15.0.53.53 | 5.15.0.53.53 |
=22.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-64k-hwe-22.04 | <5.15.0.53.48 | 5.15.0.53.48 |
=22.04 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.15.0.53.48 | 5.15.0.53.48 |
=22.04 | ||
All of | ||
ubuntu/linux-image-virtual-hwe-20.04 | <5.15.0.53.59~20.04.21 | 5.15.0.53.59~20.04.21 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-generic-lpae | <5.15.0-53.59~20.04.1 | 5.15.0-53.59~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-generic | <5.15.0-53.59~20.04.1 | 5.15.0-53.59~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-aws | <5.15.0.1023.27~20.04.15 | 5.15.0.1023.27~20.04.15 |
=20.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-hwe-20.04 | <5.15.0.53.59~20.04.19 | 5.15.0.53.59~20.04.19 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-hwe-20.04 | <5.15.0.53.59~20.04.21 | 5.15.0.53.59~20.04.21 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-generic-64k | <5.15.0-53.59~20.04.1 | 5.15.0-53.59~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-azure | <5.15.0.1023.29~20.04.16 | 5.15.0.1023.29~20.04.16 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1022-oracle | <5.15.0-1022.28~20.04.1 | 5.15.0-1022.28~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-lowlatency | <5.15.0-53.59~20.04.1 | 5.15.0-53.59~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-64k-hwe-20.04 | <5.15.0.53.59~20.04.19 | 5.15.0.53.59~20.04.19 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-53-lowlatency-64k | <5.15.0-53.59~20.04.1 | 5.15.0-53.59~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1023-azure | <5.15.0-1023.29~20.04.1 | 5.15.0-1023.29~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.15.0-1023-aws | <5.15.0-1023.27~20.04.1 | 5.15.0-1023.27~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-oracle | <5.15.0.1022.28~20.04.1 | 5.15.0.1022.28~20.04.1 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-hwe-20.04 | <5.15.0.53.59~20.04.21 | 5.15.0.53.59~20.04.21 |
=20.04 | ||
All of | ||
ubuntu/linux-image-generic-64k-hwe-20.04 | <5.15.0.53.59~20.04.21 | 5.15.0.53.59~20.04.21 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)