CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
38.2%
It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)
It was discovered that a race condition existed in the network scheduling
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-39713)
It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)
It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)
It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | linux-image-virtual | < 3.13.0.190.199 | UNKNOWN |
Ubuntu | 14.04 | noarch | hv-kvp-daemon-init | < 3.13.0.170.181 | UNKNOWN |
Ubuntu | 14.04 | noarch | linux-cloud-tools-generic | < 3.13.0.170.181 | UNKNOWN |
Ubuntu | 14.04 | noarch | linux-cloud-tools-lowlatency | < 3.13.0.170.181 | UNKNOWN |
Ubuntu | 14.04 | noarch | linux-cloud-tools-virtual | < 3.13.0.170.181 | UNKNOWN |
Ubuntu | 14.04 | noarch | linux-crashdump | < 3.13.0.170.181 | UNKNOWN |
Ubuntu | 14.04 | noarch | linux-generic | < 3.13.0.170.181 | UNKNOWN |
Ubuntu | 14.04 | noarch | linux-generic-lts-quantal | < 3.13.0.170.181 | UNKNOWN |
Ubuntu | 14.04 | noarch | linux-generic-lts-quantal-eol-upgrade | < 3.13.0.170.181 | UNKNOWN |
Ubuntu | 14.04 | noarch | linux-generic-lts-raring | < 3.13.0.170.181 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
38.2%