logo
DATABASE RESOURCES PRICING ABOUT US

Linux kernel vulnerabilities

Description

## Releases * Ubuntu 18.04 LTS ## Packages * linux \- Linux kernel * linux-aws \- Linux kernel for Amazon Web Services (AWS) systems * linux-azure-4.15 \- Linux kernel for Microsoft Azure Cloud systems * linux-dell300x \- Linux kernel for Dell 300x platforms * linux-gcp-4.15 \- Linux kernel for Google Cloud Platform (GCP) systems * linux-kvm \- Linux kernel for cloud environments * linux-oracle \- Linux kernel for Oracle Cloud systems * linux-raspi2 \- Linux kernel for Raspberry Pi systems * linux-snapdragon \- Linux kernel for Qualcomm Snapdragon processors Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2588) It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2586) It was discovered that the block layer subsystem in the Linux kernel did not properly initialize memory in some situations. A privileged local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0494) Hu Jiahui discovered that multiple race conditions existed in the Advanced Linux Sound Architecture (ALSA) framework, leading to use-after-free vulnerabilities. A local attacker could use these to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1048) It was discovered that the implementation of the 6pack and mkiss protocols in the Linux kernel did not handle detach events properly in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1195) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) Norbert Slusarek discovered that a race condition existed in the perf subsystem in the Linux kernel, resulting in a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1729) It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1734) Duoming Zhou discovered a race condition in the NFC subsystem in the Linux kernel, leading to a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1974) Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not properly prevent context switches from occurring during certain atomic context operations. A privileged local attacker could use this to cause a denial of service (system crash). (CVE-2022-1975) Minh Yuan discovered that the floppy driver in the Linux kernel contained a race condition in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-33981) Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel did not properly perform data validation. A local attacker could use this to escalate privileges in certain situations. (CVE-2022-34918)


Affected Package


OS OS Version Package Name Package Version
Ubuntu 18.04 linux-image-4.15.0-1134-gcp 4.15.0-1134.150
Ubuntu 18.04 linux-image-4.15.0-1149-azure 4.15.0-1149.164
Ubuntu 18.04 linux-image-virtual 4.15.0.191.176
Ubuntu 18.04 linux-cloud-tools-generic 4.15.0.191.176
Ubuntu 18.04 linux-cloud-tools-generic-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-cloud-tools-generic-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-cloud-tools-lowlatency 4.15.0.191.176
Ubuntu 18.04 linux-cloud-tools-lowlatency-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-cloud-tools-lowlatency-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-cloud-tools-virtual 4.15.0.191.176
Ubuntu 18.04 linux-cloud-tools-virtual-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-cloud-tools-virtual-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-crashdump 4.15.0.191.176
Ubuntu 18.04 linux-generic 4.15.0.191.176
Ubuntu 18.04 linux-generic-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-generic-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-generic-lpae 4.15.0.191.176
Ubuntu 18.04 linux-generic-lpae-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-generic-lpae-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-headers-generic 4.15.0.191.176
Ubuntu 18.04 linux-headers-generic-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-headers-generic-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-headers-generic-lpae 4.15.0.191.176
Ubuntu 18.04 linux-headers-generic-lpae-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-headers-generic-lpae-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-headers-lowlatency 4.15.0.191.176
Ubuntu 18.04 linux-headers-lowlatency-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-headers-lowlatency-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-headers-snapdragon 4.15.0.191.176
Ubuntu 18.04 linux-headers-virtual 4.15.0.191.176
Ubuntu 18.04 linux-headers-virtual-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-headers-virtual-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-image-extra-virtual 4.15.0.191.176
Ubuntu 18.04 linux-image-extra-virtual-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-image-extra-virtual-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-image-generic 4.15.0.191.176
Ubuntu 18.04 linux-image-generic-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-image-generic-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-image-generic-lpae 4.15.0.191.176
Ubuntu 18.04 linux-image-generic-lpae-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-image-generic-lpae-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-image-lowlatency 4.15.0.191.176
Ubuntu 18.04 linux-image-lowlatency-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-image-lowlatency-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-image-snapdragon 4.15.0.191.176
Ubuntu 18.04 linux-image-virtual-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-image-virtual-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-lowlatency 4.15.0.191.176
Ubuntu 18.04 linux-lowlatency-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-lowlatency-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-signed-generic 4.15.0.191.176
Ubuntu 18.04 linux-signed-generic-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-signed-generic-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-signed-image-generic 4.15.0.191.176
Ubuntu 18.04 linux-signed-image-generic-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-signed-image-generic-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-signed-image-lowlatency 4.15.0.191.176
Ubuntu 18.04 linux-signed-image-lowlatency-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-signed-image-lowlatency-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-signed-lowlatency 4.15.0.191.176
Ubuntu 18.04 linux-signed-lowlatency-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-signed-lowlatency-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-snapdragon 4.15.0.191.176
Ubuntu 18.04 linux-source 4.15.0.191.176
Ubuntu 18.04 linux-tools-generic 4.15.0.191.176
Ubuntu 18.04 linux-tools-generic-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-tools-generic-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-tools-generic-lpae 4.15.0.191.176
Ubuntu 18.04 linux-tools-generic-lpae-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-tools-generic-lpae-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-tools-lowlatency 4.15.0.191.176
Ubuntu 18.04 linux-tools-lowlatency-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-tools-lowlatency-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-tools-snapdragon 4.15.0.191.176
Ubuntu 18.04 linux-tools-virtual 4.15.0.191.176
Ubuntu 18.04 linux-tools-virtual-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-tools-virtual-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-virtual 4.15.0.191.176
Ubuntu 18.04 linux-virtual-hwe-16.04 4.15.0.191.176
Ubuntu 18.04 linux-virtual-hwe-16.04-edge 4.15.0.191.176
Ubuntu 18.04 linux-image-aws-lts-18.04 4.15.0.1139.139
Ubuntu 18.04 linux-aws 4.15.0.1139.139
Ubuntu 18.04 linux-headers-aws 4.15.0.1139.139
Ubuntu 18.04 linux-image-aws 4.15.0.1139.139
Ubuntu 18.04 linux-tools-aws 4.15.0.1139.139
Ubuntu 18.04 linux-image-oracle-lts-18.04 4.15.0.1104.111
Ubuntu 18.04 linux-image-4.15.0-191-lowlatency 4.15.0-191.202
Ubuntu 18.04 kernel-signed-image-4.15.0-20-generic-di 4.15.0-191.202
Ubuntu 18.04 linux-image-4.15.0-20-generic 4.15.0-191.202
Ubuntu 18.04 linux-image-4.15.0-20-generic-dbgsym 4.15.0-191.202
Ubuntu 18.04 linux-image-4.15.0-20-lowlatency 4.15.0-191.202
Ubuntu 18.04 linux-image-4.15.0-20-lowlatency-dbgsym 4.15.0-191.202
Ubuntu 18.04 linux-image-4.15.0-1051-dell300x 4.15.0-1051.56
Ubuntu 18.04 linux-image-4.15.0-1135-snapdragon 4.15.0-1135.145
Ubuntu 18.04 linux-image-4.15.0-1125-kvm 4.15.0-1125.130
Ubuntu 18.04 linux-headers-4.15.0-1008-kvm 4.15.0-1125.130
Ubuntu 18.04 linux-image-4.15.0-1008-kvm 4.15.0-1125.130
Ubuntu 18.04 linux-image-4.15.0-1008-kvm-dbgsym 4.15.0-1125.130
Ubuntu 18.04 linux-kvm-headers-4.15.0-1008 4.15.0-1125.130
Ubuntu 18.04 linux-kvm-tools-4.15.0-1008 4.15.0-1125.130
Ubuntu 18.04 linux-kvm-tools-4.15.0-1008-dbgsym 4.15.0-1125.130
Ubuntu 18.04 linux-modules-4.15.0-1008-kvm 4.15.0-1125.130
Ubuntu 18.04 linux-tools-4.15.0-1008-kvm 4.15.0-1125.130
Ubuntu 18.04 linux-image-4.15.0-1139-aws 4.15.0-1139.150
Ubuntu 18.04 linux-image-dell300x 4.15.0.1051.51
Ubuntu 18.04 linux-image-snapdragon 4.15.0.1135.136
Ubuntu 18.04 linux-image-raspi2 4.15.0.1117.114
Ubuntu 18.04 linux-headers-raspi2 4.15.0.1117.114
Ubuntu 18.04 linux-raspi2 4.15.0.1117.114
Ubuntu 18.04 linux-tools-raspi2 4.15.0.1117.114
Ubuntu 18.04 linux-image-azure-lts-18.04 4.15.0.1149.119
Ubuntu 18.04 linux-image-gcp-lts-18.04 4.15.0.1134.150
Ubuntu 18.04 linux-image-4.15.0-1117-raspi2 4.15.0-1117.125
Ubuntu 18.04 linux-headers-4.15.0-1010-raspi2 4.15.0-1117.125
Ubuntu 18.04 linux-image-4.15.0-1010-raspi2 4.15.0-1117.125
Ubuntu 18.04 linux-image-4.15.0-1010-raspi2-dbgsym 4.15.0-1117.125
Ubuntu 18.04 linux-modules-4.15.0-1010-raspi2 4.15.0-1117.125
Ubuntu 18.04 linux-raspi2-headers-4.15.0-1010 4.15.0-1117.125
Ubuntu 18.04 linux-raspi2-tools-4.15.0-1010 4.15.0-1117.125
Ubuntu 18.04 linux-raspi2-tools-4.15.0-1010-dbgsym 4.15.0-1117.125
Ubuntu 18.04 linux-tools-4.15.0-1010-raspi2 4.15.0-1117.125
Ubuntu 18.04 linux-image-kvm 4.15.0.1125.118
Ubuntu 18.04 linux-headers-kvm 4.15.0.1125.118
Ubuntu 18.04 linux-kvm 4.15.0.1125.118
Ubuntu 18.04 linux-tools-kvm 4.15.0.1125.118
Ubuntu 18.04 linux-image-4.15.0-191-generic 4.15.0-191.202
Ubuntu 18.04 linux-image-4.15.0-1104-oracle 4.15.0-1104.115
Ubuntu 18.04 linux-image-4.15.0-191-generic-lpae 4.15.0-191.202

Related