vulnerability
Ubuntu: (Multiple Advisories) (CVE-2022-32296): Linux kernel (Intel IoTG) vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Jun 5, 2022 | Sep 17, 2022 | Nov 15, 2024 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Jun 5, 2022
Added
Sep 17, 2022
Modified
Nov 15, 2024
Description
The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.
Solution(s)
ubuntu-upgrade-linux-image-4-15-0-1054-dell300xubuntu-upgrade-linux-image-4-15-0-1107-oracleubuntu-upgrade-linux-image-4-15-0-1120-raspi2ubuntu-upgrade-linux-image-4-15-0-1128-kvmubuntu-upgrade-linux-image-4-15-0-1137-gcpubuntu-upgrade-linux-image-4-15-0-1138-snapdragonubuntu-upgrade-linux-image-4-15-0-1142-awsubuntu-upgrade-linux-image-4-15-0-1142-aws-hweubuntu-upgrade-linux-image-4-15-0-1153-azureubuntu-upgrade-linux-image-4-15-0-194-genericubuntu-upgrade-linux-image-4-15-0-194-generic-lpaeubuntu-upgrade-linux-image-4-15-0-194-lowlatencyubuntu-upgrade-linux-image-5-15-0-1015-intel-iotgubuntu-upgrade-linux-image-5-15-0-48-genericubuntu-upgrade-linux-image-5-15-0-48-generic-64kubuntu-upgrade-linux-image-5-15-0-48-generic-lpaeubuntu-upgrade-linux-image-5-15-0-48-lowlatencyubuntu-upgrade-linux-image-5-15-0-48-lowlatency-64kubuntu-upgrade-linux-image-5-4-0-1033-ibmubuntu-upgrade-linux-image-5-4-0-1046-bluefieldubuntu-upgrade-linux-image-5-4-0-1053-gkeopubuntu-upgrade-linux-image-5-4-0-1070-raspiubuntu-upgrade-linux-image-5-4-0-1075-kvmubuntu-upgrade-linux-image-5-4-0-1083-gkeubuntu-upgrade-linux-image-5-4-0-1083-oracleubuntu-upgrade-linux-image-5-4-0-1085-awsubuntu-upgrade-linux-image-5-4-0-1089-gcpubuntu-upgrade-linux-image-5-4-0-1091-azureubuntu-upgrade-linux-image-5-4-0-1091-azure-fdeubuntu-upgrade-linux-image-5-4-0-126-genericubuntu-upgrade-linux-image-5-4-0-126-generic-lpaeubuntu-upgrade-linux-image-5-4-0-126-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04
References
- CVE-2022-32296
- https://attackerkb.com/topics/CVE-2022-32296
- DEBIAN-DSA-5173
- NVD-CVE-2022-32296
- UBUNTU-USN-5471-1
- UBUNTU-USN-5572-1
- UBUNTU-USN-5572-2
- UBUNTU-USN-5579-1
- UBUNTU-USN-5594-1
- UBUNTU-USN-5599-1
- UBUNTU-USN-5602-1
- UBUNTU-USN-5616-1
- UBUNTU-USN-5622-1
- UBUNTU-USN-5623-1
- UBUNTU-USN-5624-1
- UBUNTU-USN-5630-1
- UBUNTU-USN-5633-1
- UBUNTU-USN-5635-1
- UBUNTU-USN-5639-1
- UBUNTU-USN-5640-1
- UBUNTU-USN-5644-1
- UBUNTU-USN-5647-1
- UBUNTU-USN-5648-1
- UBUNTU-USN-5654-1
- UBUNTU-USN-5655-1
- UBUNTU-USN-5660-1
- UBUNTU-USN-5668-1
- UBUNTU-USN-5669-1
- UBUNTU-USN-5669-2
- UBUNTU-USN-5677-1
- UBUNTU-USN-5678-1
- UBUNTU-USN-5679-1
- UBUNTU-USN-5682-1
- UBUNTU-USN-5683-1
- UBUNTU-USN-5684-1
- UBUNTU-USN-5687-1
- UBUNTU-USN-5693-1
- UBUNTU-USN-5695-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.