Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2022-20008): Linux kernel vulnerabilities

Back to Search

Ubuntu: (Multiple Advisories) (CVE-2022-20008): Linux kernel vulnerabilities

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
05/10/2022
Created
05/14/2022
Added
05/12/2022
Modified
06/08/2022

Description

In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel

Solution(s)

  • ubuntu-upgrade-linux-image-5-13-0-1022-kvm
  • ubuntu-upgrade-linux-image-5-13-0-1023-aws
  • ubuntu-upgrade-linux-image-5-13-0-1023-azure
  • ubuntu-upgrade-linux-image-5-13-0-1025-gcp
  • ubuntu-upgrade-linux-image-5-13-0-1026-raspi
  • ubuntu-upgrade-linux-image-5-13-0-1026-raspi-nolpae
  • ubuntu-upgrade-linux-image-5-13-0-1028-oracle
  • ubuntu-upgrade-linux-image-5-13-0-41-generic
  • ubuntu-upgrade-linux-image-5-13-0-41-generic-64k
  • ubuntu-upgrade-linux-image-5-13-0-41-generic-lpae
  • ubuntu-upgrade-linux-image-5-13-0-41-lowlatency
  • ubuntu-upgrade-linux-image-5-4-0-1021-ibm
  • ubuntu-upgrade-linux-image-5-4-0-1040-gkeop
  • ubuntu-upgrade-linux-image-5-4-0-1060-raspi
  • ubuntu-upgrade-linux-image-5-4-0-1063-kvm
  • ubuntu-upgrade-linux-image-5-4-0-1071-gke
  • ubuntu-upgrade-linux-image-5-4-0-1071-oracle
  • ubuntu-upgrade-linux-image-5-4-0-1073-aws
  • ubuntu-upgrade-linux-image-5-4-0-1073-gcp
  • ubuntu-upgrade-linux-image-5-4-0-1078-azure
  • ubuntu-upgrade-linux-image-5-4-0-1078-azure-fde
  • ubuntu-upgrade-linux-image-5-4-0-110-generic
  • ubuntu-upgrade-linux-image-5-4-0-110-generic-lpae
  • ubuntu-upgrade-linux-image-5-4-0-110-lowlatency
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-aws-lts-20-04
  • ubuntu-upgrade-linux-image-azure
  • ubuntu-upgrade-linux-image-azure-fde
  • ubuntu-upgrade-linux-image-azure-lts-20-04
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-gcp-lts-20-04
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-64k
  • ubuntu-upgrade-linux-image-generic-64k-hwe-20-04
  • ubuntu-upgrade-linux-image-generic-hwe-18-04
  • ubuntu-upgrade-linux-image-generic-hwe-20-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-gke-5-4
  • ubuntu-upgrade-linux-image-gkeop
  • ubuntu-upgrade-linux-image-gkeop-5-4
  • ubuntu-upgrade-linux-image-ibm
  • ubuntu-upgrade-linux-image-ibm-lts-20-04
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-hwe-18-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-20-04
  • ubuntu-upgrade-linux-image-oem
  • ubuntu-upgrade-linux-image-oem-20-04
  • ubuntu-upgrade-linux-image-oem-osp1
  • ubuntu-upgrade-linux-image-oracle
  • ubuntu-upgrade-linux-image-oracle-lts-20-04
  • ubuntu-upgrade-linux-image-raspi
  • ubuntu-upgrade-linux-image-raspi-hwe-18-04
  • ubuntu-upgrade-linux-image-raspi-nolpae
  • ubuntu-upgrade-linux-image-raspi2
  • ubuntu-upgrade-linux-image-snapdragon-hwe-18-04
  • ubuntu-upgrade-linux-image-virtual
  • ubuntu-upgrade-linux-image-virtual-hwe-18-04
  • ubuntu-upgrade-linux-image-virtual-hwe-20-04

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;