First published: Sat Oct 22 2022(Updated: )
A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/Linux kernel | <6.1 | 6.1 |
Linux Kernel | =6.1-rc5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
To mitigate this issue, prevent the brcmfmac module from being loaded. See https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-3628 has a severity rating that indicates it poses a significant risk due to potential privilege escalation and system crashes.
To fix CVE-2022-3628, you should upgrade to the appropriate patched kernel versions provided by your distribution.
CVE-2022-3628 affects various Linux kernel versions including specific releases of Red Hat and Debian kernels.
CVE-2022-3628 is a buffer overflow vulnerability that can be exploited through malicious USB devices.
CVE-2022-3628 is primarily a local vulnerability, requiring access to the system to exploit.