Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2022-2196 CVE-2022-3061 CVE-2022-3628 CVE-2022-36280 CVE-2022-3646 CVE-2022-3649 CVE-2022-41850 CVE-2023-0394 CVE-2023-0461 |
CWE-ID | CWE-665 CWE-369 CWE-119 CWE-787 CWE-476 CWE-416 CWE-362 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system linux-image-oem-20.04c (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oem-20.04b (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oem-20.04d (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.14.0-1059-oem (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oem-20.04 (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.17.0-1029-oem (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oem-22.04a (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-oem-22.04 (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU74019
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2196
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper initialization within nVMX in Linux kernel. A local user can perform speculative execution attacks and escalate privileges on the system.
Update the affected package linux-oem-5.14 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oem-20.04c (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04b (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04d (Ubuntu package): before 5.14.0.1059.57
linux-image-5.14.0-1059-oem (Ubuntu package): before 5.14.0-1059.67
linux-image-oem-20.04 (Ubuntu package): before 5.14.0.1059.57
linux-image-5.17.0-1029-oem (Ubuntu package): before 5.17.0-1029.30
linux-image-oem-22.04a (Ubuntu package): before 5.17.0.1029.27
linux-image-oem-22.04 (Ubuntu package): before 5.17.0.1029.27
CPE2.3https://ubuntu.com/security/notices/USN-5976-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68516
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3061
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to missing checks of the "pixclock" value in the Linux kernel i740 driver. A local user can pass arbitrary values to the driver through ioctl() interface, trigger a divide by zero error and perform a denial of service (DoS) attack.
Update the affected package linux-oem-5.14 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oem-20.04c (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04b (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04d (Ubuntu package): before 5.14.0.1059.57
linux-image-5.14.0-1059-oem (Ubuntu package): before 5.14.0-1059.67
linux-image-oem-20.04 (Ubuntu package): before 5.14.0.1059.57
linux-image-5.17.0-1029-oem (Ubuntu package): before 5.17.0-1029.30
linux-image-oem-22.04a (Ubuntu package): before 5.17.0.1029.27
linux-image-oem-22.04 (Ubuntu package): before 5.17.0.1029.27
CPE2.3https://ubuntu.com/security/notices/USN-5976-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69803
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3628
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the brcmf_fweh_event_worker() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c. A local user can use a specially crafted device to trigger memory corruption and escalate privileges on the system.
Update the affected package linux-oem-5.14 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oem-20.04c (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04b (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04d (Ubuntu package): before 5.14.0.1059.57
linux-image-5.14.0-1059-oem (Ubuntu package): before 5.14.0-1059.67
linux-image-oem-20.04 (Ubuntu package): before 5.14.0.1059.57
linux-image-5.17.0-1029-oem (Ubuntu package): before 5.17.0-1029.30
linux-image-oem-22.04a (Ubuntu package): before 5.17.0.1029.27
linux-image-oem-22.04 (Ubuntu package): before 5.17.0.1029.27
CPE2.3https://ubuntu.com/security/notices/USN-5976-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU71480
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-36280
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the vmw_kms_cursor_snoo() function in drivers/gpu/vmxgfx/vmxgfx_kms.c in vmwgfx VMWare driver. A local user can trigger an out-of-bounds write and perform a denial of service (DoS) attack.
Update the affected package linux-oem-5.14 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oem-20.04c (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04b (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04d (Ubuntu package): before 5.14.0.1059.57
linux-image-5.14.0-1059-oem (Ubuntu package): before 5.14.0-1059.67
linux-image-oem-20.04 (Ubuntu package): before 5.14.0.1059.57
linux-image-5.17.0-1029-oem (Ubuntu package): before 5.17.0-1029.30
linux-image-oem-22.04a (Ubuntu package): before 5.17.0.1029.27
linux-image-oem-22.04 (Ubuntu package): before 5.17.0.1029.27
CPE2.3https://ubuntu.com/security/notices/USN-5976-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69299
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3646
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the nilfs2 filesystem driver within the nilfs_attach_log_writer() function in fs/nilfs2/segment.c in Linux kernel. A remote attacker can trick the victim into mounting a specially crafted image and perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-oem-5.14 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oem-20.04c (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04b (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04d (Ubuntu package): before 5.14.0.1059.57
linux-image-5.14.0-1059-oem (Ubuntu package): before 5.14.0-1059.67
linux-image-oem-20.04 (Ubuntu package): before 5.14.0.1059.57
linux-image-5.17.0-1029-oem (Ubuntu package): before 5.17.0-1029.30
linux-image-oem-22.04a (Ubuntu package): before 5.17.0.1029.27
linux-image-oem-22.04 (Ubuntu package): before 5.17.0.1029.27
CPE2.3https://ubuntu.com/security/notices/USN-5976-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69298
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-3649
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the nilfs2 filesystem driver in nilfs_new_inode() function in fs/nilfs2/inode.c in Linux kernel. A remote attacker can trick the victim into mounting a specially crafted image, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package linux-oem-5.14 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oem-20.04c (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04b (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04d (Ubuntu package): before 5.14.0.1059.57
linux-image-5.14.0-1059-oem (Ubuntu package): before 5.14.0-1059.67
linux-image-oem-20.04 (Ubuntu package): before 5.14.0.1059.57
linux-image-5.17.0-1029-oem (Ubuntu package): before 5.17.0-1029.30
linux-image-oem-22.04a (Ubuntu package): before 5.17.0.1029.27
linux-image-oem-22.04 (Ubuntu package): before 5.17.0.1029.27
CPE2.3https://ubuntu.com/security/notices/USN-5976-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69792
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-41850
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the roccat_report_event() function in drivers/hid/hid-roccat.c. A local user can trigger a use-after-free error and perform a denial of service (DoS) attack.
Update the affected package linux-oem-5.14 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oem-20.04c (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04b (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04d (Ubuntu package): before 5.14.0.1059.57
linux-image-5.14.0-1059-oem (Ubuntu package): before 5.14.0-1059.67
linux-image-oem-20.04 (Ubuntu package): before 5.14.0.1059.57
linux-image-5.17.0-1029-oem (Ubuntu package): before 5.17.0-1029.30
linux-image-oem-22.04a (Ubuntu package): before 5.17.0.1029.27
linux-image-oem-22.04 (Ubuntu package): before 5.17.0.1029.27
CPE2.3https://ubuntu.com/security/notices/USN-5976-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU71352
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-0394
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the rawv6_push_pending_frames() function in net/ipv6/raw.c. A local user can run a specially crafted program on the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-oem-5.14 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oem-20.04c (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04b (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04d (Ubuntu package): before 5.14.0.1059.57
linux-image-5.14.0-1059-oem (Ubuntu package): before 5.14.0-1059.67
linux-image-oem-20.04 (Ubuntu package): before 5.14.0.1059.57
linux-image-5.17.0-1029-oem (Ubuntu package): before 5.17.0-1029.30
linux-image-oem-22.04a (Ubuntu package): before 5.17.0.1029.27
linux-image-oem-22.04 (Ubuntu package): before 5.17.0.1029.27
CPE2.3https://ubuntu.com/security/notices/USN-5976-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72506
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-0461
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the Upper Level Protocol (ULP) subsystem in Linux kernel caused by improper handling of sockets entering the LISTEN state in certain protocols. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected package linux-oem-5.14 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 22.04
linux-image-oem-20.04c (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04b (Ubuntu package): before 5.14.0.1059.57
linux-image-oem-20.04d (Ubuntu package): before 5.14.0.1059.57
linux-image-5.14.0-1059-oem (Ubuntu package): before 5.14.0-1059.67
linux-image-oem-20.04 (Ubuntu package): before 5.14.0.1059.57
linux-image-5.17.0-1029-oem (Ubuntu package): before 5.17.0-1029.30
linux-image-oem-22.04a (Ubuntu package): before 5.17.0.1029.27
linux-image-oem-22.04 (Ubuntu package): before 5.17.0.1029.27
CPE2.3https://ubuntu.com/security/notices/USN-5976-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.