vulnerability
Ubuntu: (Multiple Advisories) (CVE-2022-29901): Linux kernel (Intel IoTG) vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | 2022-07-12 | 2022-08-11 | 2024-11-07 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
2022-07-12
Added
2022-08-11
Modified
2024-11-07
Description
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Solution(s)
ubuntu-upgrade-linux-image-4-15-0-1060-dell300xubuntu-upgrade-linux-image-4-15-0-1114-oracleubuntu-upgrade-linux-image-4-15-0-1127-raspi2ubuntu-upgrade-linux-image-4-15-0-1135-kvmubuntu-upgrade-linux-image-4-15-0-1145-gcpubuntu-upgrade-linux-image-4-15-0-1145-snapdragonubuntu-upgrade-linux-image-4-15-0-1146-gcpubuntu-upgrade-linux-image-4-15-0-1150-awsubuntu-upgrade-linux-image-4-15-0-1161-azureubuntu-upgrade-linux-image-4-15-0-1162-azureubuntu-upgrade-linux-image-4-15-0-204-genericubuntu-upgrade-linux-image-4-15-0-204-generic-lpaeubuntu-upgrade-linux-image-4-15-0-204-lowlatencyubuntu-upgrade-linux-image-4-15-0-206-genericubuntu-upgrade-linux-image-4-15-0-206-lowlatencyubuntu-upgrade-linux-image-4-4-0-1120-awsubuntu-upgrade-linux-image-4-4-0-1121-kvmubuntu-upgrade-linux-image-4-4-0-1158-awsubuntu-upgrade-linux-image-4-4-0-242-genericubuntu-upgrade-linux-image-4-4-0-242-lowlatencyubuntu-upgrade-linux-image-5-15-0-1012-ibmubuntu-upgrade-linux-image-5-15-0-1013-intel-iotgubuntu-upgrade-linux-image-5-15-0-1013-raspiubuntu-upgrade-linux-image-5-15-0-1013-raspi-nolpaeubuntu-upgrade-linux-image-5-15-0-1014-gkeubuntu-upgrade-linux-image-5-15-0-1016-gcpubuntu-upgrade-linux-image-5-15-0-1016-kvmubuntu-upgrade-linux-image-5-15-0-1016-oracleubuntu-upgrade-linux-image-5-15-0-1017-awsubuntu-upgrade-linux-image-5-15-0-1017-azureubuntu-upgrade-linux-image-5-15-0-46-genericubuntu-upgrade-linux-image-5-15-0-46-generic-64kubuntu-upgrade-linux-image-5-15-0-46-generic-lpaeubuntu-upgrade-linux-image-5-15-0-46-lowlatencyubuntu-upgrade-linux-image-5-15-0-46-lowlatency-64kubuntu-upgrade-linux-image-5-4-0-1037-ibmubuntu-upgrade-linux-image-5-4-0-1050-bluefieldubuntu-upgrade-linux-image-5-4-0-1057-gkeopubuntu-upgrade-linux-image-5-4-0-1074-raspiubuntu-upgrade-linux-image-5-4-0-1079-kvmubuntu-upgrade-linux-image-5-4-0-1087-gkeubuntu-upgrade-linux-image-5-4-0-1087-oracleubuntu-upgrade-linux-image-5-4-0-1089-awsubuntu-upgrade-linux-image-5-4-0-1093-gcpubuntu-upgrade-linux-image-5-4-0-1095-azureubuntu-upgrade-linux-image-5-4-0-1095-azure-fdeubuntu-upgrade-linux-image-5-4-0-132-genericubuntu-upgrade-linux-image-5-4-0-132-generic-lpaeubuntu-upgrade-linux-image-5-4-0-132-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-hwe-22-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-hwe-22-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
- CVE-2022-29901
- https://attackerkb.com/topics/CVE-2022-29901
- DEBIAN-DSA-5207
- NVD-CVE-2022-29901
- UBUNTU-USN-5564-1
- UBUNTU-USN-5565-1
- UBUNTU-USN-5566-1
- UBUNTU-USN-5650-1
- UBUNTU-USN-5692-1
- UBUNTU-USN-5693-1
- UBUNTU-USN-5700-1
- UBUNTU-USN-5708-1
- UBUNTU-USN-5727-1
- UBUNTU-USN-5727-2
- UBUNTU-USN-5728-1
- UBUNTU-USN-5728-2
- UBUNTU-USN-5728-3
- UBUNTU-USN-5729-1
- UBUNTU-USN-5729-2
- UBUNTU-USN-5752-1
- UBUNTU-USN-5854-1
- UBUNTU-USN-5861-1
- UBUNTU-USN-5862-1
- UBUNTU-USN-5865-1
- UBUNTU-USN-5883-1
- UBUNTU-USN-5924-1
- UBUNTU-USN-5975-1
- UBUNTU-USN-6007-1
- UBUNTU-USN-6221-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.