Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)
Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | linux-image-5.15.0-33-generic-lpae | < 5.15.0-33.34 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-buildinfo-5.15.0-33-generic | < 5.15.0-33.34 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-cloud-tools-5.15.0-33 | < 5.15.0-33.34 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-cloud-tools-5.15.0-33-generic | < 5.15.0-33.34 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-cloud-tools-common | < 5.15.0-33.34 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-doc | < 5.15.0-33.34 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-headers-5.15.0-33 | < 5.15.0-33.34 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-headers-5.15.0-33-generic | < 5.15.0-33.34 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-unsigned-5.15.0-33-generic | < 5.15.0-33.34 | UNKNOWN |
Ubuntu | 22.04 | noarch | linux-image-unsigned-5.15.0-33-generic-dbgsym | < 5.15.0-33.34 | UNKNOWN |