Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. (CVE-2022-0492)
Brendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver in the Linux kernel did not properly handle some error conditions. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2021-43976)
Wenqing Liu discovered that the f2fs file system implementation in the Linux kernel did not properly validate inode types while performing garbage collection. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash). (CVE-2021-44879)
Samuel Page discovered that the Transparent Inter-Process Communication (TIPC) protocol implementation in the Linux kernel contained a stack-based buffer overflow. A remote attacker could use this to cause a denial of service (system crash) for systems that have a TIPC bearer configured. (CVE-2022-0435)
Lyu Tao discovered that the NFS implementation in the Linux kernel did not properly handle requests to open a directory on a regular file. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-24448)
It was discovered that the YAM AX.25 device driver in the Linux kernel did not properly deallocate memory in some error conditions. A local privileged attacker could use this to cause a denial of service (kernel memory exhaustion). (CVE-2022-24959)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.14.0-1024.26", "binary_name": "linux-buildinfo-5.14.0-1024-oem" }, { "binary_version": "5.14.0-1024.26", "binary_name": "linux-headers-5.14.0-1024-oem" }, { "binary_version": "5.14.0-1024.26", "binary_name": "linux-image-unsigned-5.14.0-1024-oem" }, { "binary_version": "5.14.0-1024.26", "binary_name": "linux-modules-5.14.0-1024-oem" }, { "binary_version": "5.14.0-1024.26", "binary_name": "linux-oem-5.14-headers-5.14.0-1024" }, { "binary_version": "5.14.0-1024.26", "binary_name": "linux-oem-5.14-tools-5.14.0-1024" }, { "binary_version": "5.14.0-1024.26", "binary_name": "linux-oem-5.14-tools-host" }, { "binary_version": "5.14.0-1024.26", "binary_name": "linux-tools-5.14.0-1024-oem" } ] }
{ "ecosystem": "Ubuntu:20.04:LTS", "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "low", "type": "Ubuntu" } ], "id": "CVE-2021-43976" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "low", "type": "Ubuntu" } ], "id": "CVE-2021-44879" }, { "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2022-0435" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "high", "type": "Ubuntu" } ], "id": "CVE-2022-0492" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2022-24448" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "negligible", "type": "Ubuntu" } ], "id": "CVE-2022-24959" } ] }