USN-5667-1

Source
https://ubuntu.com/security/notices/USN-5667-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5667-1
Upstream
Related
Published
2022-10-10T20:35:30Z
Modified
2026-04-24T09:47:50.480644680Z
Summary
linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-gcp, linux-gke, linux-gkeop, linux-hwe-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-oracle, linux-raspi vulnerabilities
Details

Selim Enes Karaduman discovered that a race condition existed in the General notification queue implementation of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1882)

Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information. (CVE-2022-26373)

Eric Biggers discovered that a use-after-free vulnerability existed in the io_uring subsystem in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3176)

It was discovered that the Netlink Transformation (XFRM) subsystem in the Linux kernel contained a reference counting error. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-36879)

Jann Horn discovered that the KVM subsystem in the Linux kernel did not properly handle TLB flush operations in some situations. A local attacker in a guest VM could use this to cause a denial of service (guest crash) or possibly execute arbitrary code in the guest kernel. (CVE-2022-39189)

References

Affected packages

Ubuntu:20.04:LTS
linux-aws-5.15

Package

Name
linux-aws-5.15
Purl
pkg:deb/ubuntu/linux-aws-5.15@5.15.0-1021.25~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1021.25~20.04.1

Affected versions

5.*
5.15.0-1014.18~20.04.1
5.15.0-1015.19~20.04.1
5.15.0-1017.21~20.04.1
5.15.0-1019.23~20.04.1
5.15.0-1020.24~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-aws-5.15-headers-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-aws-5.15-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-headers-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-modules-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25~20.04.1",
            "binary_name": "linux-tools-5.15.0-1021-aws"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-azure-5.15

Package

Name
linux-azure-5.15
Purl
pkg:deb/ubuntu/linux-azure-5.15@5.15.0-1021.26~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1021.26~20.04.1

Affected versions

5.*
5.15.0-1007.8~20.04.1
5.15.0-1008.9~20.04.1
5.15.0-1013.16~20.04.1
5.15.0-1014.17~20.04.1
5.15.0-1017.20~20.04.1
5.15.0-1019.24~20.04.1
5.15.0-1020.25~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-azure-5.15-headers-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-azure-5.15-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-headers-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-modules-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26~20.04.1",
            "binary_name": "linux-tools-5.15.0-1021-azure"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-hwe-5.15

Package

Name
linux-hwe-5.15
Purl
pkg:deb/ubuntu/linux-hwe-5.15@5.15.0-50.56~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-50.56~20.04.1

Affected versions

5.*
5.15.0-33.34~20.04.1
5.15.0-41.44~20.04.1
5.15.0-43.46~20.04.1
5.15.0-46.49~20.04.1
5.15.0-48.54~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-50-generic-lpae"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-headers-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-headers-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-headers-5.15.0-50-generic-lpae"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-hwe-5.15-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-hwe-5.15-headers-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-hwe-5.15-source-5.15.0"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-hwe-5.15-tools-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-hwe-5.15-tools-common"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-hwe-5.15-tools-host"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-image-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-image-5.15.0-50-generic-lpae"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-modules-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-modules-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-modules-5.15.0-50-generic-lpae"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-modules-iwlwifi-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-tools-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-tools-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-tools-5.15.0-50-generic-lpae"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-lowlatency-hwe-5.15

Package

Name
linux-lowlatency-hwe-5.15
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-5.15@5.15.0-50.56~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-50.56~20.04.1

Affected versions

5.*
5.15.0-33.34~20.04.1
5.15.0-42.45~20.04.1
5.15.0-43.46~20.04.1
5.15.0-46.49~20.04.1
5.15.0-48.54~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-50-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-headers-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-headers-5.15.0-50-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-50-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-tools-common"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-tools-host"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-modules-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-modules-5.15.0-50-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-modules-iwlwifi-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-tools-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56~20.04.1",
            "binary_name": "linux-tools-5.15.0-50-lowlatency-64k"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
Ubuntu:22.04:LTS
linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux@5.15.0-50.56?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-50.56

Affected versions

5.*
5.13.0-19.19
5.15.0-17.17
5.15.0-18.18
5.15.0-22.22
5.15.0-23.23
5.15.0-25.25
5.15.0-27.28
5.15.0-30.31
5.15.0-33.34
5.15.0-35.36
5.15.0-37.39
5.15.0-39.42
5.15.0-40.43
5.15.0-41.44
5.15.0-43.46
5.15.0-46.49
5.15.0-47.51
5.15.0-48.54

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-buildinfo-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-buildinfo-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-buildinfo-5.15.0-50-generic-lpae"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-cloud-tools-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-cloud-tools-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-headers-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-headers-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-headers-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-headers-5.15.0-50-generic-lpae"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-image-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-image-5.15.0-50-generic-lpae"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-image-unsigned-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-image-unsigned-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-modules-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-modules-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-modules-5.15.0-50-generic-lpae"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-modules-extra-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-modules-iwlwifi-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-source-5.15.0"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-tools-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-tools-5.15.0-50-generic"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-tools-5.15.0-50-generic-64k"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-tools-5.15.0-50-generic-lpae"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-tools-common"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-tools-host"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws@5.15.0-1021.25?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1021.25

Affected versions

5.*
5.13.0-1005.6
5.15.0-1002.4
5.15.0-1003.5
5.15.0-1004.6
5.15.0-1005.7
5.15.0-1008.10
5.15.0-1009.11
5.15.0-1011.14
5.15.0-1013.17
5.15.0-1014.18
5.15.0-1015.19
5.15.0-1017.21
5.15.0-1019.23
5.15.0-1020.24

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-aws-cloud-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-aws-headers-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-aws-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-buildinfo-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-cloud-tools-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-headers-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-image-unsigned-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-modules-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-modules-extra-5.15.0-1021-aws"
        },
        {
            "binary_version": "5.15.0-1021.25",
            "binary_name": "linux-tools-5.15.0-1021-aws"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-azure

Package

Name
linux-azure
Purl
pkg:deb/ubuntu/linux-azure@5.15.0-1021.26?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1021.26

Affected versions

5.*
5.13.0-1006.7
5.15.0-1001.2
5.15.0-1002.3
5.15.0-1003.4
5.15.0-1005.6
5.15.0-1007.8
5.15.0-1008.9
5.15.0-1010.12
5.15.0-1012.15
5.15.0-1013.16
5.15.0-1014.17
5.15.0-1017.20
5.15.0-1019.24
5.15.0-1020.25

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-azure-cloud-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-azure-headers-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-azure-tools-5.15.0-1021"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-buildinfo-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-cloud-tools-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-headers-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-image-unsigned-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-modules-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-modules-extra-5.15.0-1021-azure"
        },
        {
            "binary_version": "5.15.0-1021.26",
            "binary_name": "linux-tools-5.15.0-1021-azure"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp@5.15.0-1019.25?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1019.25

Affected versions

5.*
5.13.0-1005.6
5.15.0-1001.3
5.15.0-1002.5
5.15.0-1003.6
5.15.0-1004.7
5.15.0-1005.8
5.15.0-1006.9
5.15.0-1008.12
5.15.0-1010.15
5.15.0-1013.18
5.15.0-1016.21
5.15.0-1017.23
5.15.0-1018.24

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1019.25",
            "binary_name": "linux-buildinfo-5.15.0-1019-gcp"
        },
        {
            "binary_version": "5.15.0-1019.25",
            "binary_name": "linux-gcp-headers-5.15.0-1019"
        },
        {
            "binary_version": "5.15.0-1019.25",
            "binary_name": "linux-gcp-tools-5.15.0-1019"
        },
        {
            "binary_version": "5.15.0-1019.25",
            "binary_name": "linux-headers-5.15.0-1019-gcp"
        },
        {
            "binary_version": "5.15.0-1019.25",
            "binary_name": "linux-image-unsigned-5.15.0-1019-gcp"
        },
        {
            "binary_version": "5.15.0-1019.25",
            "binary_name": "linux-modules-5.15.0-1019-gcp"
        },
        {
            "binary_version": "5.15.0-1019.25",
            "binary_name": "linux-modules-extra-5.15.0-1019-gcp"
        },
        {
            "binary_version": "5.15.0-1019.25",
            "binary_name": "linux-modules-iwlwifi-5.15.0-1019-gcp"
        },
        {
            "binary_version": "5.15.0-1019.25",
            "binary_name": "linux-tools-5.15.0-1019-gcp"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-gke

Package

Name
linux-gke
Purl
pkg:deb/ubuntu/linux-gke@5.15.0-1017.20?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1017.20

Affected versions

5.*
5.15.0-1002.2
5.15.0-1003.3
5.15.0-1004.5
5.15.0-1005.6
5.15.0-1006.7
5.15.0-1008.10
5.15.0-1010.13
5.15.0-1011.14
5.15.0-1014.17
5.15.0-1015.18
5.15.0-1016.19

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1017.20",
            "binary_name": "linux-buildinfo-5.15.0-1017-gke"
        },
        {
            "binary_version": "5.15.0-1017.20",
            "binary_name": "linux-gke-headers-5.15.0-1017"
        },
        {
            "binary_version": "5.15.0-1017.20",
            "binary_name": "linux-gke-tools-5.15.0-1017"
        },
        {
            "binary_version": "5.15.0-1017.20",
            "binary_name": "linux-headers-5.15.0-1017-gke"
        },
        {
            "binary_version": "5.15.0-1017.20",
            "binary_name": "linux-image-unsigned-5.15.0-1017-gke"
        },
        {
            "binary_version": "5.15.0-1017.20",
            "binary_name": "linux-modules-5.15.0-1017-gke"
        },
        {
            "binary_version": "5.15.0-1017.20",
            "binary_name": "linux-modules-extra-5.15.0-1017-gke"
        },
        {
            "binary_version": "5.15.0-1017.20",
            "binary_name": "linux-modules-iwlwifi-5.15.0-1017-gke"
        },
        {
            "binary_version": "5.15.0-1017.20",
            "binary_name": "linux-tools-5.15.0-1017-gke"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-gkeop

Package

Name
linux-gkeop
Purl
pkg:deb/ubuntu/linux-gkeop@5.15.0-1004.6?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1004.6

Affected versions

5.*
5.15.0-1001.2
5.15.0-1002.4
5.15.0-1003.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-buildinfo-5.15.0-1004-gkeop"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-cloud-tools-5.15.0-1004-gkeop"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-gkeop-cloud-tools-5.15.0-1004"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-gkeop-headers-5.15.0-1004"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-gkeop-tools-5.15.0-1004"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-headers-5.15.0-1004-gkeop"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-image-unsigned-5.15.0-1004-gkeop"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-modules-5.15.0-1004-gkeop"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-modules-extra-5.15.0-1004-gkeop"
        },
        {
            "binary_version": "5.15.0-1004.6",
            "binary_name": "linux-tools-5.15.0-1004-gkeop"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm@5.15.0-1019.23?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1019.23

Affected versions

5.*
5.13.0-1004.4
5.13.0-1006.6+22.04.1
5.13.0-1007.7+22.04.1
5.13.0-1010.11+22.04.1
5.15.0-1002.2
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1007.7
5.15.0-1008.8
5.15.0-1010.11
5.15.0-1012.14
5.15.0-1013.16
5.15.0-1016.19
5.15.0-1017.21
5.15.0-1018.22

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1019.23",
            "binary_name": "linux-buildinfo-5.15.0-1019-kvm"
        },
        {
            "binary_version": "5.15.0-1019.23",
            "binary_name": "linux-headers-5.15.0-1019-kvm"
        },
        {
            "binary_version": "5.15.0-1019.23",
            "binary_name": "linux-image-unsigned-5.15.0-1019-kvm"
        },
        {
            "binary_version": "5.15.0-1019.23",
            "binary_name": "linux-kvm-headers-5.15.0-1019"
        },
        {
            "binary_version": "5.15.0-1019.23",
            "binary_name": "linux-kvm-tools-5.15.0-1019"
        },
        {
            "binary_version": "5.15.0-1019.23",
            "binary_name": "linux-modules-5.15.0-1019-kvm"
        },
        {
            "binary_version": "5.15.0-1019.23",
            "binary_name": "linux-tools-5.15.0-1019-kvm"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-lowlatency

Package

Name
linux-lowlatency
Purl
pkg:deb/ubuntu/linux-lowlatency@5.15.0-50.56?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-50.56

Affected versions

5.*
5.15.0-22.22
5.15.0-23.23
5.15.0-24.24
5.15.0-27.28
5.15.0-30.31
5.15.0-33.34
5.15.0-35.36
5.15.0-37.39
5.15.0-39.42
5.15.0-40.43
5.15.0-41.44
5.15.0-43.46
5.15.0-46.49
5.15.0-47.53
5.15.0-48.54

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-buildinfo-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-buildinfo-5.15.0-50-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-cloud-tools-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-headers-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-headers-5.15.0-50-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-image-unsigned-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-image-unsigned-5.15.0-50-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-lowlatency-cloud-tools-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-lowlatency-cloud-tools-common"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-lowlatency-headers-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-lowlatency-tools-5.15.0-50"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-lowlatency-tools-common"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-lowlatency-tools-host"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-modules-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-modules-5.15.0-50-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-modules-iwlwifi-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-tools-5.15.0-50-lowlatency"
        },
        {
            "binary_version": "5.15.0-50.56",
            "binary_name": "linux-tools-5.15.0-50-lowlatency-64k"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-oracle

Package

Name
linux-oracle
Purl
pkg:deb/ubuntu/linux-oracle@5.15.0-1019.24?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1019.24

Affected versions

5.*
5.13.0-1008.10
5.15.0-1001.3
5.15.0-1002.4
5.15.0-1003.5
5.15.0-1006.8
5.15.0-1007.9
5.15.0-1009.12
5.15.0-1011.15
5.15.0-1013.17
5.15.0-1016.20
5.15.0-1017.22
5.15.0-1018.23

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1019.24",
            "binary_name": "linux-buildinfo-5.15.0-1019-oracle"
        },
        {
            "binary_version": "5.15.0-1019.24",
            "binary_name": "linux-headers-5.15.0-1019-oracle"
        },
        {
            "binary_version": "5.15.0-1019.24",
            "binary_name": "linux-image-unsigned-5.15.0-1019-oracle"
        },
        {
            "binary_version": "5.15.0-1019.24",
            "binary_name": "linux-modules-5.15.0-1019-oracle"
        },
        {
            "binary_version": "5.15.0-1019.24",
            "binary_name": "linux-modules-extra-5.15.0-1019-oracle"
        },
        {
            "binary_version": "5.15.0-1019.24",
            "binary_name": "linux-oracle-headers-5.15.0-1019"
        },
        {
            "binary_version": "5.15.0-1019.24",
            "binary_name": "linux-oracle-tools-5.15.0-1019"
        },
        {
            "binary_version": "5.15.0-1019.24",
            "binary_name": "linux-tools-5.15.0-1019-oracle"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}
linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi@5.15.0-1016.18?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1016.18

Affected versions

5.*
5.13.0-1008.9
5.15.0-1002.2
5.15.0-1003.3
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1006.6
5.15.0-1008.8
5.15.0-1011.13
5.15.0-1012.14
5.15.0-1013.15
5.15.0-1014.16
5.15.0-1015.17

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-buildinfo-5.15.0-1016-raspi"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-buildinfo-5.15.0-1016-raspi-nolpae"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-headers-5.15.0-1016-raspi"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-headers-5.15.0-1016-raspi-nolpae"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-image-5.15.0-1016-raspi"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-image-5.15.0-1016-raspi-nolpae"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-modules-5.15.0-1016-raspi"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-modules-5.15.0-1016-raspi-nolpae"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-modules-extra-5.15.0-1016-raspi"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-modules-extra-5.15.0-1016-raspi-nolpae"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-raspi-headers-5.15.0-1016"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-raspi-tools-5.15.0-1016"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-tools-5.15.0-1016-raspi"
        },
        {
            "binary_version": "5.15.0-1016.18",
            "binary_name": "linux-tools-5.15.0-1016-raspi-nolpae"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5667-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2022-1882",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}