This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU61215
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-43976
CWE-ID:
CWE-20 - Improper Input Validation
Exploit availability: No
DescriptionThe vulnerability allows an attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the mwifiex_usb_recv() function in drivers/net/wireless/marvell/mwifiex/usb.c in Linux kernel. An attacker with physical access to the system can insert a specially crafted USB device and perform a denial of service (DoS) attack.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 21.10, 20.04
linux-image-generic-64k-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-lpae-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-virtual-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency (Ubuntu package): before 5.13.0.40.49
linux-image-generic-lpae (Ubuntu package): before 5.13.0.40.49
linux-image-kvm (Ubuntu package): before 5.13.0.1021.21
linux-image-5.13.0-1025-raspi (Ubuntu package): before 5.13.0-1025.27
linux-image-raspi (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-1027-oracle (Ubuntu package): before 5.13.0-1027.32~20.04.1
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-5.13.0-1022-aws (Ubuntu package): before 5.13.0-1022.24~20.04.1
linux-image-oem-20.04 (Ubuntu package): before 5.13.0.40.49
linux-image-raspi-nolpae (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-40-generic-lpae (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-5.13.0-40-generic (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-5.13.0-1021-kvm (Ubuntu package): before 5.13.0-1021.22
linux-image-5.13.0-1025-raspi-nolpae (Ubuntu package): before 5.13.0-1025.27
linux-image-5.13.0-1024-gcp (Ubuntu package): before 5.13.0-1024.29~20.04.1
linux-image-5.13.0-1022-azure (Ubuntu package): before 5.13.0-1022.26~20.04.1
linux-image-aws (Ubuntu package): before 5.13.0.1022.24~20.04.15
linux-image-5.13.0-40-lowlatency (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-generic (Ubuntu package): before 5.13.0.40.49
linux-image-generic-64k (Ubuntu package): before 5.13.0.40.49
linux-image-virtual (Ubuntu package): before 5.13.0.40.49
linux-image-5.13.0-40-generic-64k (Ubuntu package): before 5.13.0-40.45~20.04.1
http://ubuntu.com/security/notices/USN-5383-1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU62483
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-44879
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the gc_data_segment() function in fs/f2fs/gc.c. A local user can mount a specially crafted f2fs image, trigger a NULL pointer dereference and perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 21.10, 20.04
linux-image-generic-64k-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-lpae-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-virtual-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency (Ubuntu package): before 5.13.0.40.49
linux-image-generic-lpae (Ubuntu package): before 5.13.0.40.49
linux-image-kvm (Ubuntu package): before 5.13.0.1021.21
linux-image-5.13.0-1025-raspi (Ubuntu package): before 5.13.0-1025.27
linux-image-raspi (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-1027-oracle (Ubuntu package): before 5.13.0-1027.32~20.04.1
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-5.13.0-1022-aws (Ubuntu package): before 5.13.0-1022.24~20.04.1
linux-image-oem-20.04 (Ubuntu package): before 5.13.0.40.49
linux-image-raspi-nolpae (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-40-generic-lpae (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-5.13.0-40-generic (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-5.13.0-1021-kvm (Ubuntu package): before 5.13.0-1021.22
linux-image-5.13.0-1025-raspi-nolpae (Ubuntu package): before 5.13.0-1025.27
linux-image-5.13.0-1024-gcp (Ubuntu package): before 5.13.0-1024.29~20.04.1
linux-image-5.13.0-1022-azure (Ubuntu package): before 5.13.0-1022.26~20.04.1
linux-image-aws (Ubuntu package): before 5.13.0.1022.24~20.04.15
linux-image-5.13.0-40-lowlatency (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-generic (Ubuntu package): before 5.13.0.40.49
linux-image-generic-64k (Ubuntu package): before 5.13.0.40.49
linux-image-virtual (Ubuntu package): before 5.13.0.40.49
linux-image-5.13.0-40-generic-64k (Ubuntu package): before 5.13.0-40.45~20.04.1
http://ubuntu.com/security/notices/USN-5383-1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU61210
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-0617
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the Linux kernel UDF file system functionality. A local user can supply a malicious UDF image to the udf_file_write_iter() function and perform a denial of service (DoS) attack.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 21.10, 20.04
linux-image-generic-64k-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-lpae-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-virtual-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency (Ubuntu package): before 5.13.0.40.49
linux-image-generic-lpae (Ubuntu package): before 5.13.0.40.49
linux-image-kvm (Ubuntu package): before 5.13.0.1021.21
linux-image-5.13.0-1025-raspi (Ubuntu package): before 5.13.0-1025.27
linux-image-raspi (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-1027-oracle (Ubuntu package): before 5.13.0-1027.32~20.04.1
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-5.13.0-1022-aws (Ubuntu package): before 5.13.0-1022.24~20.04.1
linux-image-oem-20.04 (Ubuntu package): before 5.13.0.40.49
linux-image-raspi-nolpae (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-40-generic-lpae (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-5.13.0-40-generic (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-5.13.0-1021-kvm (Ubuntu package): before 5.13.0-1021.22
linux-image-5.13.0-1025-raspi-nolpae (Ubuntu package): before 5.13.0-1025.27
linux-image-5.13.0-1024-gcp (Ubuntu package): before 5.13.0-1024.29~20.04.1
linux-image-5.13.0-1022-azure (Ubuntu package): before 5.13.0-1022.26~20.04.1
linux-image-aws (Ubuntu package): before 5.13.0.1022.24~20.04.15
linux-image-5.13.0-40-lowlatency (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-generic (Ubuntu package): before 5.13.0.40.49
linux-image-generic-64k (Ubuntu package): before 5.13.0.40.49
linux-image-virtual (Ubuntu package): before 5.13.0.40.49
linux-image-5.13.0-40-generic-64k (Ubuntu package): before 5.13.0-40.45~20.04.1
http://ubuntu.com/security/notices/USN-5383-1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU62027
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-1015
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: Yes
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the nft_validate_register_store and nft_validate_register_load in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. A local user can escalate privileges on the system.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 21.10, 20.04
linux-image-generic-64k-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-lpae-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-virtual-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency (Ubuntu package): before 5.13.0.40.49
linux-image-generic-lpae (Ubuntu package): before 5.13.0.40.49
linux-image-kvm (Ubuntu package): before 5.13.0.1021.21
linux-image-5.13.0-1025-raspi (Ubuntu package): before 5.13.0-1025.27
linux-image-raspi (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-1027-oracle (Ubuntu package): before 5.13.0-1027.32~20.04.1
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-5.13.0-1022-aws (Ubuntu package): before 5.13.0-1022.24~20.04.1
linux-image-oem-20.04 (Ubuntu package): before 5.13.0.40.49
linux-image-raspi-nolpae (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-40-generic-lpae (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-5.13.0-40-generic (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-5.13.0-1021-kvm (Ubuntu package): before 5.13.0-1021.22
linux-image-5.13.0-1025-raspi-nolpae (Ubuntu package): before 5.13.0-1025.27
linux-image-5.13.0-1024-gcp (Ubuntu package): before 5.13.0-1024.29~20.04.1
linux-image-5.13.0-1022-azure (Ubuntu package): before 5.13.0-1022.26~20.04.1
linux-image-aws (Ubuntu package): before 5.13.0.1022.24~20.04.15
linux-image-5.13.0-40-lowlatency (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-generic (Ubuntu package): before 5.13.0.40.49
linux-image-generic-64k (Ubuntu package): before 5.13.0.40.49
linux-image-virtual (Ubuntu package): before 5.13.0.40.49
linux-image-5.13.0-40-generic-64k (Ubuntu package): before 5.13.0-40.45~20.04.1
http://ubuntu.com/security/notices/USN-5383-1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU62028
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-1016
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a use-after-free error in net/netfilter/nf_tables_core.c:nft_do_chain in Linux kernel.. A local user can trigger a use-after-free error and gain access to sensitive information.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 21.10, 20.04
linux-image-generic-64k-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-lpae-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-virtual-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency (Ubuntu package): before 5.13.0.40.49
linux-image-generic-lpae (Ubuntu package): before 5.13.0.40.49
linux-image-kvm (Ubuntu package): before 5.13.0.1021.21
linux-image-5.13.0-1025-raspi (Ubuntu package): before 5.13.0-1025.27
linux-image-raspi (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-1027-oracle (Ubuntu package): before 5.13.0-1027.32~20.04.1
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-5.13.0-1022-aws (Ubuntu package): before 5.13.0-1022.24~20.04.1
linux-image-oem-20.04 (Ubuntu package): before 5.13.0.40.49
linux-image-raspi-nolpae (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-40-generic-lpae (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-5.13.0-40-generic (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-5.13.0-1021-kvm (Ubuntu package): before 5.13.0-1021.22
linux-image-5.13.0-1025-raspi-nolpae (Ubuntu package): before 5.13.0-1025.27
linux-image-5.13.0-1024-gcp (Ubuntu package): before 5.13.0-1024.29~20.04.1
linux-image-5.13.0-1022-azure (Ubuntu package): before 5.13.0-1022.26~20.04.1
linux-image-aws (Ubuntu package): before 5.13.0.1022.24~20.04.15
linux-image-5.13.0-40-lowlatency (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-generic (Ubuntu package): before 5.13.0.40.49
linux-image-generic-64k (Ubuntu package): before 5.13.0.40.49
linux-image-virtual (Ubuntu package): before 5.13.0.40.49
linux-image-5.13.0-40-generic-64k (Ubuntu package): before 5.13.0-40.45~20.04.1
http://ubuntu.com/security/notices/USN-5383-1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU61211
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-24448
CWE-ID:
CWE-909 - Missing initialization of resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to missing initialization of resource within the fs/nfs/dir.c in the Linux kernel. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.
Update the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 21.10, 20.04
linux-image-generic-64k-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-lpae-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-virtual-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency (Ubuntu package): before 5.13.0.40.49
linux-image-generic-lpae (Ubuntu package): before 5.13.0.40.49
linux-image-kvm (Ubuntu package): before 5.13.0.1021.21
linux-image-5.13.0-1025-raspi (Ubuntu package): before 5.13.0-1025.27
linux-image-raspi (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-1027-oracle (Ubuntu package): before 5.13.0-1027.32~20.04.1
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-5.13.0-1022-aws (Ubuntu package): before 5.13.0-1022.24~20.04.1
linux-image-oem-20.04 (Ubuntu package): before 5.13.0.40.49
linux-image-raspi-nolpae (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-40-generic-lpae (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-5.13.0-40-generic (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-5.13.0-1021-kvm (Ubuntu package): before 5.13.0-1021.22
linux-image-5.13.0-1025-raspi-nolpae (Ubuntu package): before 5.13.0-1025.27
linux-image-5.13.0-1024-gcp (Ubuntu package): before 5.13.0-1024.29~20.04.1
linux-image-5.13.0-1022-azure (Ubuntu package): before 5.13.0-1022.26~20.04.1
linux-image-aws (Ubuntu package): before 5.13.0.1022.24~20.04.15
linux-image-5.13.0-40-lowlatency (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-generic (Ubuntu package): before 5.13.0.40.49
linux-image-generic-64k (Ubuntu package): before 5.13.0.40.49
linux-image-virtual (Ubuntu package): before 5.13.0.40.49
linux-image-5.13.0-40-generic-64k (Ubuntu package): before 5.13.0-40.45~20.04.1
http://ubuntu.com/security/notices/USN-5383-1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU62482
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-24959
CWE-ID:
CWE-401 - Improper Release of Memory Before Removing Last Reference ('Memory Leak')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the yam_siocdevprivate() function in drivers/net/hamradio/yam.c. A local user can perform a denial of service attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 21.10, 20.04
linux-image-generic-64k-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-lpae-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-virtual-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency (Ubuntu package): before 5.13.0.40.49
linux-image-generic-lpae (Ubuntu package): before 5.13.0.40.49
linux-image-kvm (Ubuntu package): before 5.13.0.1021.21
linux-image-5.13.0-1025-raspi (Ubuntu package): before 5.13.0-1025.27
linux-image-raspi (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-1027-oracle (Ubuntu package): before 5.13.0-1027.32~20.04.1
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-5.13.0-1022-aws (Ubuntu package): before 5.13.0-1022.24~20.04.1
linux-image-oem-20.04 (Ubuntu package): before 5.13.0.40.49
linux-image-raspi-nolpae (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-40-generic-lpae (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-5.13.0-40-generic (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-5.13.0-1021-kvm (Ubuntu package): before 5.13.0-1021.22
linux-image-5.13.0-1025-raspi-nolpae (Ubuntu package): before 5.13.0-1025.27
linux-image-5.13.0-1024-gcp (Ubuntu package): before 5.13.0-1024.29~20.04.1
linux-image-5.13.0-1022-azure (Ubuntu package): before 5.13.0-1022.26~20.04.1
linux-image-aws (Ubuntu package): before 5.13.0.1022.24~20.04.15
linux-image-5.13.0-40-lowlatency (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-generic (Ubuntu package): before 5.13.0.40.49
linux-image-generic-64k (Ubuntu package): before 5.13.0.40.49
linux-image-virtual (Ubuntu package): before 5.13.0.40.49
linux-image-5.13.0-40-generic-64k (Ubuntu package): before 5.13.0-40.45~20.04.1
http://ubuntu.com/security/notices/USN-5383-1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU62484
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26878
CWE-ID:
CWE-401 - Improper Release of Memory Before Removing Last Reference ('Memory Leak')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak within the drivers/bluetooth/virtio_bt.c file in the Linux kernel. A local user can trigger leak memory and perform denial of service attack.
MitigationUpdate the affected package linux to the latest version.
Vulnerable software versionsUbuntu: 21.10, 20.04
linux-image-generic-64k-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-lpae-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-generic-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-virtual-hwe-20.04 (Ubuntu package): before 5.13.0.40.45~20.04.25
linux-image-lowlatency (Ubuntu package): before 5.13.0.40.49
linux-image-generic-lpae (Ubuntu package): before 5.13.0.40.49
linux-image-kvm (Ubuntu package): before 5.13.0.1021.21
linux-image-5.13.0-1025-raspi (Ubuntu package): before 5.13.0-1025.27
linux-image-raspi (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-1027-oracle (Ubuntu package): before 5.13.0-1027.32~20.04.1
linux-image-oracle (Ubuntu package): before 5.13.0.1027.32~20.04.1
linux-image-gcp (Ubuntu package): before 5.13.0.1024.29~20.04.1
linux-image-gke (Ubuntu package): before 5.13.0.1024.22
linux-image-5.13.0-1022-aws (Ubuntu package): before 5.13.0-1022.24~20.04.1
linux-image-oem-20.04 (Ubuntu package): before 5.13.0.40.49
linux-image-raspi-nolpae (Ubuntu package): before 5.13.0.1025.30
linux-image-5.13.0-40-generic-lpae (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-azure (Ubuntu package): before 5.13.0.1022.26~20.04.11
linux-image-5.13.0-40-generic (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-5.13.0-1021-kvm (Ubuntu package): before 5.13.0-1021.22
linux-image-5.13.0-1025-raspi-nolpae (Ubuntu package): before 5.13.0-1025.27
linux-image-5.13.0-1024-gcp (Ubuntu package): before 5.13.0-1024.29~20.04.1
linux-image-5.13.0-1022-azure (Ubuntu package): before 5.13.0-1022.26~20.04.1
linux-image-aws (Ubuntu package): before 5.13.0.1022.24~20.04.15
linux-image-5.13.0-40-lowlatency (Ubuntu package): before 5.13.0-40.45~20.04.1
linux-image-generic (Ubuntu package): before 5.13.0.40.49
linux-image-generic-64k (Ubuntu package): before 5.13.0.40.49
linux-image-virtual (Ubuntu package): before 5.13.0.40.49
linux-image-5.13.0-40-generic-64k (Ubuntu package): before 5.13.0-40.45~20.04.1
http://ubuntu.com/security/notices/USN-5383-1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?