CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
31.3%
It was discovered that the Packet network protocol implementation in the
Linux kernel contained a double-free vulnerability. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2021-22600)
Jann Horn discovered a race condition in the Unix domain socket
implementation in the Linux kernel that could result in a read-after-free.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-4083)
Kirill Tkhai discovered that the XFS file system implementation in the
Linux kernel did not calculate size correctly when pre-allocating space in
some situations. A local attacker could use this to expose sensitive
information. (CVE-2021-4155)
Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)
It was discovered that the VMware Virtual GPU driver in the Linux kernel
did not properly handle certain failure conditions, leading to a stale
entry in the file descriptor table. A local attacker could use this to
expose sensitive information or possibly gain administrative privileges.
(CVE-2022-22942)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 21.10 | noarch | linux-image-5.13.0-30-generic-lpae | < 5.13.0-30.33 | UNKNOWN |
Ubuntu | 21.10 | noarch | linux-buildinfo-5.13.0-30-generic | < 5.13.0-30.33 | UNKNOWN |
Ubuntu | 21.10 | noarch | linux-buildinfo-5.13.0-30-lowlatency | < 5.13.0-30.33 | UNKNOWN |
Ubuntu | 21.10 | noarch | linux-cloud-tools-5.13.0-30 | < 5.13.0-30.33 | UNKNOWN |
Ubuntu | 21.10 | noarch | linux-cloud-tools-5.13.0-30-generic | < 5.13.0-30.33 | UNKNOWN |
Ubuntu | 21.10 | noarch | linux-cloud-tools-5.13.0-30-lowlatency | < 5.13.0-30.33 | UNKNOWN |
Ubuntu | 21.10 | noarch | linux-cloud-tools-common | < 5.13.0-30.33 | UNKNOWN |
Ubuntu | 21.10 | noarch | linux-doc | < 5.13.0-30.33 | UNKNOWN |
Ubuntu | 21.10 | noarch | linux-headers-5.13.0-30 | < 5.13.0-30.33 | UNKNOWN |
Ubuntu | 21.10 | noarch | linux-headers-5.13.0-30-generic | < 5.13.0-30.33 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
31.3%