CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
60.4%
It was discovered that the io_uring subsystem in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-3910)
It was discovered that a race condition existed in the Android Binder IPC
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-20421)
David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)
It was discovered that the sound subsystem in the Linux kernel contained a
race condition in some situations. A local attacker could use this to cause
a denial of service (system crash). (CVE-2022-3303)
It was discovered that the Sunplus Ethernet driver in the Linux kernel
contained a read-after-free vulnerability. An attacker could possibly use
this to expose sensitive information (kernel memory) (CVE-2022-3541)
It was discovered that a memory leak existed in the Unix domain socket
implementation of the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2022-3543)
It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3544, CVE-2022-3646)
Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)
It was discovered that the hugetlb implementation in the Linux kernel
contained a race condition in some situations. A local attacker could use
this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2022-3623)
Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)
It was discovered that a race condition existed in the MCTP implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3977)
It was discovered that a race condition existed in the EFI capsule loader
driver in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-40307)
Zheng Wang and Zhuorao Yang discovered that the RealTek RTL8712U wireless
driver in the Linux kernel contained a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-4095)
It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)
It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)
It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.10 | noarch | linux-image-gcp | < 5.19.0.1014.11 | UNKNOWN |
Ubuntu | 22.10 | noarch | linux-gcp | < 5.19.0.1014.11 | UNKNOWN |
Ubuntu | 22.10 | noarch | linux-headers-gcp | < 5.19.0.1014.11 | UNKNOWN |
Ubuntu | 22.10 | noarch | linux-modules-extra-gcp | < 5.19.0.1014.11 | UNKNOWN |
Ubuntu | 22.10 | noarch | linux-tools-gcp | < 5.19.0.1014.11 | UNKNOWN |
Ubuntu | 22.10 | noarch | linux-image-oracle | < 5.19.0.1014.11 | UNKNOWN |
Ubuntu | 22.10 | noarch | linux-headers-oracle | < 5.19.0.1014.11 | UNKNOWN |
Ubuntu | 22.10 | noarch | linux-oracle | < 5.19.0.1014.11 | UNKNOWN |
Ubuntu | 22.10 | noarch | linux-tools-oracle | < 5.19.0.1014.11 | UNKNOWN |
Ubuntu | 22.10 | noarch | linux-image-5.19.0-1014-gcp | < 5.19.0-1014.15 | UNKNOWN |
ubuntu.com/security/CVE-2022-20421
ubuntu.com/security/CVE-2022-2663
ubuntu.com/security/CVE-2022-3303
ubuntu.com/security/CVE-2022-3541
ubuntu.com/security/CVE-2022-3543
ubuntu.com/security/CVE-2022-3544
ubuntu.com/security/CVE-2022-3586
ubuntu.com/security/CVE-2022-3623
ubuntu.com/security/CVE-2022-3646
ubuntu.com/security/CVE-2022-3649
ubuntu.com/security/CVE-2022-3910
ubuntu.com/security/CVE-2022-3977
ubuntu.com/security/CVE-2022-40307
ubuntu.com/security/CVE-2022-4095
ubuntu.com/security/CVE-2022-41849
ubuntu.com/security/CVE-2022-41850
ubuntu.com/security/CVE-2022-43750