vulnerability
Ubuntu: (Multiple Advisories) (CVE-2022-29901): Linux kernel (Intel IoTG) vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | Jul 12, 2022 | Aug 11, 2022 | Nov 7, 2024 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
Jul 12, 2022
Added
Aug 11, 2022
Modified
Nov 7, 2024
Description
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Solution(s)
ubuntu-upgrade-linux-image-4-15-0-1060-dell300xubuntu-upgrade-linux-image-4-15-0-1114-oracleubuntu-upgrade-linux-image-4-15-0-1127-raspi2ubuntu-upgrade-linux-image-4-15-0-1135-kvmubuntu-upgrade-linux-image-4-15-0-1145-gcpubuntu-upgrade-linux-image-4-15-0-1145-snapdragonubuntu-upgrade-linux-image-4-15-0-1146-gcpubuntu-upgrade-linux-image-4-15-0-1150-awsubuntu-upgrade-linux-image-4-15-0-1161-azureubuntu-upgrade-linux-image-4-15-0-1162-azureubuntu-upgrade-linux-image-4-15-0-204-genericubuntu-upgrade-linux-image-4-15-0-204-generic-lpaeubuntu-upgrade-linux-image-4-15-0-204-lowlatencyubuntu-upgrade-linux-image-4-15-0-206-genericubuntu-upgrade-linux-image-4-15-0-206-lowlatencyubuntu-upgrade-linux-image-4-4-0-1120-awsubuntu-upgrade-linux-image-4-4-0-1121-kvmubuntu-upgrade-linux-image-4-4-0-1158-awsubuntu-upgrade-linux-image-4-4-0-242-genericubuntu-upgrade-linux-image-4-4-0-242-lowlatencyubuntu-upgrade-linux-image-5-15-0-1012-ibmubuntu-upgrade-linux-image-5-15-0-1013-intel-iotgubuntu-upgrade-linux-image-5-15-0-1013-raspiubuntu-upgrade-linux-image-5-15-0-1013-raspi-nolpaeubuntu-upgrade-linux-image-5-15-0-1014-gkeubuntu-upgrade-linux-image-5-15-0-1016-gcpubuntu-upgrade-linux-image-5-15-0-1016-kvmubuntu-upgrade-linux-image-5-15-0-1016-oracleubuntu-upgrade-linux-image-5-15-0-1017-awsubuntu-upgrade-linux-image-5-15-0-1017-azureubuntu-upgrade-linux-image-5-15-0-46-genericubuntu-upgrade-linux-image-5-15-0-46-generic-64kubuntu-upgrade-linux-image-5-15-0-46-generic-lpaeubuntu-upgrade-linux-image-5-15-0-46-lowlatencyubuntu-upgrade-linux-image-5-15-0-46-lowlatency-64kubuntu-upgrade-linux-image-5-4-0-1037-ibmubuntu-upgrade-linux-image-5-4-0-1050-bluefieldubuntu-upgrade-linux-image-5-4-0-1057-gkeopubuntu-upgrade-linux-image-5-4-0-1074-raspiubuntu-upgrade-linux-image-5-4-0-1079-kvmubuntu-upgrade-linux-image-5-4-0-1087-gkeubuntu-upgrade-linux-image-5-4-0-1087-oracleubuntu-upgrade-linux-image-5-4-0-1089-awsubuntu-upgrade-linux-image-5-4-0-1093-gcpubuntu-upgrade-linux-image-5-4-0-1095-azureubuntu-upgrade-linux-image-5-4-0-1095-azure-fdeubuntu-upgrade-linux-image-5-4-0-132-genericubuntu-upgrade-linux-image-5-4-0-132-generic-lpaeubuntu-upgrade-linux-image-5-4-0-132-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-hwe-22-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-hwe-22-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
- CVE-2022-29901
- https://attackerkb.com/topics/CVE-2022-29901
- DEBIAN-DSA-5207
- NVD-CVE-2022-29901
- UBUNTU-USN-5564-1
- UBUNTU-USN-5565-1
- UBUNTU-USN-5566-1
- UBUNTU-USN-5650-1
- UBUNTU-USN-5692-1
- UBUNTU-USN-5693-1
- UBUNTU-USN-5700-1
- UBUNTU-USN-5708-1
- UBUNTU-USN-5727-1
- UBUNTU-USN-5727-2
- UBUNTU-USN-5728-1
- UBUNTU-USN-5728-2
- UBUNTU-USN-5728-3
- UBUNTU-USN-5729-1
- UBUNTU-USN-5729-2
- UBUNTU-USN-5752-1
- UBUNTU-USN-5854-1
- UBUNTU-USN-5861-1
- UBUNTU-USN-5862-1
- UBUNTU-USN-5865-1
- UBUNTU-USN-5883-1
- UBUNTU-USN-5924-1
- UBUNTU-USN-5975-1
- UBUNTU-USN-6007-1
- UBUNTU-USN-6221-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.