Description: | Summary: The remote host is missing an update for the 'linux, linux-hwe-5.15, linux-lowlatency, linux-lowlatency-hwe-5.15' package(s) announced via the USN-5565-1 advisory.
Vulnerability Insight: Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2588)
It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2586)
It was discovered that the implementation of POSIX timers in the Linux kernel did not properly clean up timers in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-2585)
Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64 processors, the branch predictor could by mis-trained for return instructions in certain circumstances. A local attacker could possibly use this to expose sensitive information. (CVE-2022-29900)
Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64 processors, the Linux kernel's protections against speculative branch target injection attacks were insufficient in some circumstances. A local attacker could possibly use this to expose sensitive information. (CVE-2022-29901)
Affected Software/OS: 'linux, linux-hwe-5.15, linux-lowlatency, linux-lowlatency-hwe-5.15' package(s) on Ubuntu 20.04, Ubuntu 22.04.
Solution: Please install the updated package(s).
CVSS Score: 2.1
CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
|