linux, linux-aws, linux-aws-hwe, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-gke, linux-hwe, linux-hwe-5.13, linux-ibm, linux-kvm, linux-lowlatency, linux-oracle, linux-raspi, linux-raspi2, linux-snapdragon vulnerabilities
Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-29581)
Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions. (CVE-2022-30594)
4.15.0-180.1894.15.0-1130.1394.15.0-1139.1524.15.0-1124.1384.15.0-1116.1194.15.0-1095.1044.15.0-1111.1184.15.0-1129.1385.13.0-1025.27~20.04.15.13.0-1025.29~20.04.15.13.0-44.49~20.04.15.15.0-33.345.15.0-1008.105.15.0-1007.85.15.0-1005.85.15.0-1005.65.15.0-1004.45.15.0-1007.75.15.0-33.345.15.0-1006.85.15.0-1008.84.15.0-1139.152~14.04.14.15.0-1130.139~16.04.14.15.0-1139.152~16.04.14.15.0-1124.138~16.04.14.15.0-180.189~16.04.14.15.0-1095.104~16.04.1