Risk | Low |
Patch available | YES |
Number of vulnerabilities | 12 |
CVE-ID | CVE-2022-0995 CVE-2024-26837 CVE-2025-21993 CVE-2025-21702 CVE-2025-21700 CVE-2025-21701 CVE-2024-50248 CVE-2024-56651 CVE-2024-46826 CVE-2024-50256 CVE-2025-21756 CVE-2025-21703 |
CWE-ID | CWE-787 CWE-667 CWE-125 CWE-399 CWE-416 CWE-20 CWE-388 |
Exploitation vector | Local |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #11 is available. |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system linux-image-5.15.0-138-fips (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1082-aws-fips (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-5.15.0-1081-gcp-fips (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-aws-fips (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-gcp-fips (Ubuntu package) Operating systems & Components / Operating system package or component linux-image-fips (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 12 vulnerabilities.
EUVDB-ID: #VU61772
Risk: Low
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]
CVE-ID: CVE-2022-0995
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: Yes
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Linux kernel’s watch_queue event notification subsystem. A local user can run a specially crafted program to trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.
EUVDB-ID: #VU92039
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26837
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the switchdev_obj_eq() and switchdev_port_obj_del() functions in net/switchdev/switchdev.c, within the br_switchdev_mdb_replay_one() and br_switchdev_mdb_replay() functions in net/bridge/br_switchdev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106651
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21993
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ibft_attr_show_nic() function in drivers/firmware/iscsi_ibft.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104074
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21702
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pfifo_tail_enqueue() function in net/sched/sch_fifo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103959
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21700
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_lookup() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103960
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21701
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ethnl_ops_begin() function in net/ethtool/netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100205
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50248
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to boundary error within the mi_enum_attr() function in fs/ntfs3/record.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102030
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56651
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hi3110_can_ist() function in drivers/net/can/spi/hi311x.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97839
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46826
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fs/binfmt_elf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50256
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104945
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2025-21756
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() and __vsock_release() functions in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU104073
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21703
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package linux-aws-fips to the latest version.
Vulnerable software versionsUbuntu: 22.04
linux-image-5.15.0-138-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1082-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-5.15.0-1081-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-aws-fips (Ubuntu package): before Ubuntu Pro
linux-image-gcp-fips (Ubuntu package): before Ubuntu Pro
linux-image-fips (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7455-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.