vulnerability
Ubuntu: (Multiple Advisories) (CVE-2022-4139): Linux kernel (OEM) vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Jan 27, 2023 | Mar 22, 2023 | Jan 28, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Jan 27, 2023
Added
Mar 22, 2023
Modified
Jan 28, 2025
Description
An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
Solution(s)
ubuntu-upgrade-linux-image-5-14-0-1057-oemubuntu-upgrade-linux-image-5-15-0-1016-gkeopubuntu-upgrade-linux-image-5-15-0-1025-raspiubuntu-upgrade-linux-image-5-15-0-1025-raspi-nolpaeubuntu-upgrade-linux-image-5-15-0-1026-ibmubuntu-upgrade-linux-image-5-15-0-1026-intel-iotgubuntu-upgrade-linux-image-5-15-0-1028-gkeubuntu-upgrade-linux-image-5-15-0-1029-kvmubuntu-upgrade-linux-image-5-15-0-1030-gcpubuntu-upgrade-linux-image-5-15-0-1030-oracleubuntu-upgrade-linux-image-5-15-0-1031-awsubuntu-upgrade-linux-image-5-15-0-1034-azureubuntu-upgrade-linux-image-5-15-0-1034-azure-fdeubuntu-upgrade-linux-image-5-15-0-67-genericubuntu-upgrade-linux-image-5-15-0-67-generic-64kubuntu-upgrade-linux-image-5-15-0-67-generic-lpaeubuntu-upgrade-linux-image-5-15-0-67-lowlatencyubuntu-upgrade-linux-image-5-15-0-67-lowlatency-64kubuntu-upgrade-linux-image-5-17-0-1032-oemubuntu-upgrade-linux-image-5-19-0-1014-raspiubuntu-upgrade-linux-image-5-19-0-1014-raspi-nolpaeubuntu-upgrade-linux-image-5-19-0-1018-gcpubuntu-upgrade-linux-image-5-19-0-1018-ibmubuntu-upgrade-linux-image-5-19-0-1018-lowlatencyubuntu-upgrade-linux-image-5-19-0-1018-lowlatency-64kubuntu-upgrade-linux-image-5-19-0-1018-oracleubuntu-upgrade-linux-image-5-19-0-1019-kvmubuntu-upgrade-linux-image-5-19-0-1020-awsubuntu-upgrade-linux-image-5-19-0-1021-azureubuntu-upgrade-linux-image-5-19-0-35-genericubuntu-upgrade-linux-image-5-19-0-35-generic-64kubuntu-upgrade-linux-image-5-19-0-35-generic-lpaeubuntu-upgrade-linux-image-5-4-0-1045-ibmubuntu-upgrade-linux-image-5-4-0-1059-bluefieldubuntu-upgrade-linux-image-5-4-0-1065-gkeopubuntu-upgrade-linux-image-5-4-0-1081-raspiubuntu-upgrade-linux-image-5-4-0-1087-kvmubuntu-upgrade-linux-image-5-4-0-1094-oracleubuntu-upgrade-linux-image-5-4-0-1095-gkeubuntu-upgrade-linux-image-5-4-0-1097-awsubuntu-upgrade-linux-image-5-4-0-1101-gcpubuntu-upgrade-linux-image-5-4-0-1104-azureubuntu-upgrade-linux-image-5-4-0-144-genericubuntu-upgrade-linux-image-5-4-0-144-generic-lpaeubuntu-upgrade-linux-image-5-4-0-144-lowlatencyubuntu-upgrade-linux-image-6-0-0-1016-oemubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-aws-lts-22-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-azure-lts-22-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-hwe-22-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-22-04ubuntu-upgrade-linux-image-oem-22-04aubuntu-upgrade-linux-image-oem-22-04bubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-hwe-22-04
References
- CVE-2022-4139
- https://attackerkb.com/topics/CVE-2022-4139
- UBUNTU-USN-5859-1
- UBUNTU-USN-5911-1
- UBUNTU-USN-5912-1
- UBUNTU-USN-5917-1
- UBUNTU-USN-5929-1
- UBUNTU-USN-5934-1
- UBUNTU-USN-5935-1
- UBUNTU-USN-5938-1
- UBUNTU-USN-5939-1
- UBUNTU-USN-5940-1
- UBUNTU-USN-5941-1
- UBUNTU-USN-5950-1
- UBUNTU-USN-5951-1
- UBUNTU-USN-5962-1
- UBUNTU-USN-6000-1
- UBUNTU-USN-6089-1
- UBUNTU-USN-6124-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.