8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
47.4%
Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk,
Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre
Variant 2 mitigations for AMD processors on Linux were insufficient in some
situations. A local attacker could possibly use this to expose sensitive
information. (CVE-2021-26401)
Demi Marie Obenour and Simon Gaiser discovered that several Xen para-
virtualization device frontends did not properly restrict the access rights
of device backends. An attacker could possibly use a malicious Xen backend
to gain access to memory pages of a guest VM or cause a denial of service
in the guest. (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038,
CVE-2022-23039, CVE-2022-23040, CVE-2022-23042)
It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)
It was discovered that the USB gadget subsystem in the Linux kernel did not
properly validate interface descriptor requests. An attacker could possibly
use this to cause a denial of service (system crash). (CVE-2022-25258)
It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in
the Linux kernel did not properly validate the size of the RNDIS_MSG_SET
command. An attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-25375)
It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)
It was discovered that the USB SR9700 ethernet device driver for the Linux
kernel did not properly validate the length of requests from the device. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-26966)
It was discovered that the Xilinx USB2 device gadget driver in the Linux
kernel did not properly validate endpoint indices from the host. A
physically proximate attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-27223)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1127-snapdragon | < 4.15.0-1127.136 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-buildinfo-4.15.0-1127-snapdragon | < 4.15.0-1127.136 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-headers-4.15.0-1127-snapdragon | < 4.15.0-1127.136 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1127-snapdragon-dbgsym | < 4.15.0-1127.136 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-modules-4.15.0-1127-snapdragon | < 4.15.0-1127.136 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-snapdragon-headers-4.15.0-1127 | < 4.15.0-1127.136 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-snapdragon-tools-4.15.0-1127 | < 4.15.0-1127.136 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-tools-4.15.0-1127-snapdragon | < 4.15.0-1127.136 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-virtual | < 4.15.0.177.166 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-cloud-tools-generic | < 4.15.0.177.166 | UNKNOWN |
ubuntu.com/security/CVE-2021-26401
ubuntu.com/security/CVE-2022-23036
ubuntu.com/security/CVE-2022-23037
ubuntu.com/security/CVE-2022-23038
ubuntu.com/security/CVE-2022-23039
ubuntu.com/security/CVE-2022-23040
ubuntu.com/security/CVE-2022-23042
ubuntu.com/security/CVE-2022-24958
ubuntu.com/security/CVE-2022-25258
ubuntu.com/security/CVE-2022-25375
ubuntu.com/security/CVE-2022-26490
ubuntu.com/security/CVE-2022-26966
ubuntu.com/security/CVE-2022-27223
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
47.4%