vulnerability
Ubuntu: (Multiple Advisories) (CVE-2022-29901): Linux kernel (Intel IoTG) vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | Jul 12, 2022 | Aug 11, 2022 | Aug 18, 2025 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
Jul 12, 2022
Added
Aug 11, 2022
Modified
Aug 18, 2025
Description
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Solutions
ubuntu-upgrade-linux-image-4-15-0-1060-dell300xubuntu-upgrade-linux-image-4-15-0-1114-oracleubuntu-upgrade-linux-image-4-15-0-1127-raspi2ubuntu-upgrade-linux-image-4-15-0-1135-kvmubuntu-upgrade-linux-image-4-15-0-1145-gcpubuntu-upgrade-linux-image-4-15-0-1145-snapdragonubuntu-upgrade-linux-image-4-15-0-1146-gcpubuntu-upgrade-linux-image-4-15-0-1150-awsubuntu-upgrade-linux-image-4-15-0-1161-azureubuntu-upgrade-linux-image-4-15-0-1162-azureubuntu-upgrade-linux-image-4-15-0-204-genericubuntu-upgrade-linux-image-4-15-0-204-generic-lpaeubuntu-upgrade-linux-image-4-15-0-204-lowlatencyubuntu-upgrade-linux-image-4-15-0-206-genericubuntu-upgrade-linux-image-4-15-0-206-lowlatencyubuntu-upgrade-linux-image-4-4-0-1120-awsubuntu-upgrade-linux-image-4-4-0-1121-kvmubuntu-upgrade-linux-image-4-4-0-1158-awsubuntu-upgrade-linux-image-4-4-0-242-genericubuntu-upgrade-linux-image-4-4-0-242-lowlatencyubuntu-upgrade-linux-image-5-15-0-1012-ibmubuntu-upgrade-linux-image-5-15-0-1013-intel-iotgubuntu-upgrade-linux-image-5-15-0-1013-raspiubuntu-upgrade-linux-image-5-15-0-1013-raspi-nolpaeubuntu-upgrade-linux-image-5-15-0-1014-gkeubuntu-upgrade-linux-image-5-15-0-1016-gcpubuntu-upgrade-linux-image-5-15-0-1016-kvmubuntu-upgrade-linux-image-5-15-0-1016-oracleubuntu-upgrade-linux-image-5-15-0-1017-awsubuntu-upgrade-linux-image-5-15-0-1017-azureubuntu-upgrade-linux-image-5-15-0-46-genericubuntu-upgrade-linux-image-5-15-0-46-generic-64kubuntu-upgrade-linux-image-5-15-0-46-generic-lpaeubuntu-upgrade-linux-image-5-15-0-46-lowlatencyubuntu-upgrade-linux-image-5-15-0-46-lowlatency-64kubuntu-upgrade-linux-image-5-4-0-1037-ibmubuntu-upgrade-linux-image-5-4-0-1050-bluefieldubuntu-upgrade-linux-image-5-4-0-1057-gkeopubuntu-upgrade-linux-image-5-4-0-1074-raspiubuntu-upgrade-linux-image-5-4-0-1079-kvmubuntu-upgrade-linux-image-5-4-0-1087-gkeubuntu-upgrade-linux-image-5-4-0-1087-oracleubuntu-upgrade-linux-image-5-4-0-1089-awsubuntu-upgrade-linux-image-5-4-0-1093-gcpubuntu-upgrade-linux-image-5-4-0-1095-azureubuntu-upgrade-linux-image-5-4-0-1095-azure-fdeubuntu-upgrade-linux-image-5-4-0-132-genericubuntu-upgrade-linux-image-5-4-0-132-generic-lpaeubuntu-upgrade-linux-image-5-4-0-132-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-hwe-22-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-hwe-22-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.