Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 14 |
CVE-ID | CVE-2021-33655 CVE-2021-33656 CVE-2021-4037 CVE-2022-0850 CVE-2022-1199 CVE-2022-1204 CVE-2022-1729 CVE-2022-20368 CVE-2022-2639 CVE-2022-2964 CVE-2022-2978 CVE-2022-3028 CVE-2022-3202 CVE-2022-36946 |
CWE-ID | CWE-787 CWE-284 CWE-200 CWE-476 CWE-416 CWE-362 CWE-125 CWE-191 CWE-20 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #9 is available. Public exploit code for vulnerability #14 is available. |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system linux-image-virtual-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-1113-aws (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic-lts-xenial (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-kvm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-1151-aws (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-1114-kvm (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-234-generic (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-4.4.0-234-lowlatency (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-aws (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-generic (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-virtual (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 14 vulnerabilities.
EUVDB-ID: #VU65833
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-33655
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in FBIOPUT_VSCREENINFO IOCTL. A local user can trigger an out-of-bounds write error and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66590
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-33656
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when setting font with malicous data by ioctl cmd PIO_FONT. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63923
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-4037
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the fs/inode.c:inode_init_owner() function logic of the Linux kernel. A local user can create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set to bypass implemented security restrictions and gain unauthorized access to the application.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63423
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-0850
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in the copy_page_to_iter() function in iov_iter.c in Linux kernel. A local user can gain unauthorized access to sensitive information on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63432
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-1199
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a Null pointer dereference and use after free errors in the ax25_release() function. A local user can simulate Amateur Radio and perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63791
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-1204
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the Linux kernel’s Amateur Radio AX.25 protocol functionality when user connects with the protocol. A local user can trigger use-after-free error to perform a denial of service attack or escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64156
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-1729
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within sys_perf_event_open() in Linux kernel. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67473
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-20368
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary condition within the packet_recvmsg() function in Linux kernel. A local user can trigger an out-of-bounds read error and potentially escalate privileges on the system.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66812
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2022-2639
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer underflow within the reserve_sfa_size() function in the openvswitch kernel module in Linux kernel. A local user can trigger an out-of-bounds read error and crash the system or escalate privileges.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU67811
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2964
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices driver in Linux kernel. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67812
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2978
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the Linux kernel NILFS file system. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67477
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3028
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. A local user can exploit the race and escalate privileges on the system.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67810
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3202
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in diFree in fs/jfs/inode.c in Journaled File System (JFS) in the Linux kernel. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66476
Risk: Medium
CVSSv4.0: 7.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2022-36946
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the nfqnl_mangle() function in net/netfilter/nfnetlink_queue.c in the Linux kernel when processing IPv6 packets. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 14.04 - 16.04
linux-image-virtual-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1113-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic-lts-xenial (Ubuntu package): before 4.4.0.234.240
linux-image-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1151-aws (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-1114-kvm (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-generic (Ubuntu package): before 4.4.0.234.240
linux-image-4.4.0-234-lowlatency (Ubuntu package): before 4.4.0.234.240
linux-image-aws (Ubuntu package): before 4.4.0.234.240
linux-image-generic (Ubuntu package): before 4.4.0.234.240
linux-image-virtual (Ubuntu package): before 4.4.0.234.240
CPE2.3https://ubuntu.com/security/notices/USN-5650-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.