logo
DATABASE RESOURCES PRICING ABOUT US

Linux kernel (OEM) vulnerabilities

Description

## Releases * Ubuntu 20.04 LTS ## Packages * linux-oem-5.14 \- Linux kernel for OEM systems It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) Minh Yuan discovered that the floppy driver in the Linux kernel contained a race condition in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1836) Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. A local attacker could use this to cause a denial of service or execute arbitrary code. (CVE-2022-1972)


Affected Package


OS OS Version Package Name Package Version
Ubuntu 20.04 linux-image-oem-20.04c 5.14.0.1042.38
Ubuntu 20.04 linux-image-oem-20.04b 5.14.0.1042.38
Ubuntu 20.04 linux-image-oem-20.04d 5.14.0.1042.38
Ubuntu 20.04 linux-image-oem-20.04 5.14.0.1042.38
Ubuntu 20.04 linux-image-5.14.0-1042-oem 5.14.0-1042.47

Related