First published: Wed Oct 26 2022(Updated: )
David Bouman and Billy Jheng Bing Jhong discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2602) Sönke Huster discovered that an integer overflow vulnerability existed in the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-41674) Sönke Huster discovered that a use-after-free vulnerability existed in the WiFi driver stack in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42719) Sönke Huster discovered that the WiFi driver stack in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-42720) Sönke Huster discovered that the WiFi driver stack in the Linux kernel did not properly handle BSSID/SSID lists in some situations. A physically proximate attacker could use this to cause a denial of service (infinite loop). (CVE-2022-42721) Sönke Huster discovered that the WiFi driver stack in the Linux kernel contained a NULL pointer dereference vulnerability in certain situations. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2022-42722)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-5.19.0-1011-aws | <5.19.0-1011.12 | 5.19.0-1011.12 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-1006-raspi-nolpae | <5.19.0-1006.13 | 5.19.0-1006.13 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-23-generic | <5.19.0-23.24 | 5.19.0-23.24 |
=22.10 | ||
All of | ||
ubuntu/linux-image-virtual | <5.19.0.23.22 | 5.19.0.23.22 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-1010-ibm | <5.19.0-1010.11 | 5.19.0-1010.11 |
=22.10 | ||
All of | ||
ubuntu/linux-image-generic-64k | <5.19.0.23.22 | 5.19.0.23.22 |
=22.10 | ||
All of | ||
ubuntu/linux-image-generic | <5.19.0.23.22 | 5.19.0.23.22 |
=22.10 | ||
All of | ||
ubuntu/linux-image-aws | <5.19.0.1011.10 | 5.19.0.1011.10 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-1010-kvm | <5.19.0-1010.11 | 5.19.0-1010.11 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-1006-raspi | <5.19.0-1006.13 | 5.19.0-1006.13 |
=22.10 | ||
All of | ||
ubuntu/linux-image-ibm | <5.19.0.1010.9 | 5.19.0.1010.9 |
=22.10 | ||
All of | ||
ubuntu/linux-image-lowlatency-64k | <5.19.0.1009.8 | 5.19.0.1009.8 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-1010-gcp | <5.19.0-1010.11 | 5.19.0-1010.11 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-1010-azure | <5.19.0-1010.11 | 5.19.0-1010.11 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-23-generic-64k | <5.19.0-23.24 | 5.19.0-23.24 |
=22.10 | ||
All of | ||
ubuntu/linux-image-azure | <5.19.0.1010.9 | 5.19.0.1010.9 |
=22.10 | ||
All of | ||
ubuntu/linux-image-raspi-nolpae | <5.19.0.1006.7 | 5.19.0.1006.7 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-1009-lowlatency-64k | <5.19.0-1009.10 | 5.19.0-1009.10 |
=22.10 | ||
All of | ||
ubuntu/linux-image-oem-22.04 | <5.19.0.23.22 | 5.19.0.23.22 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-1009-lowlatency | <5.19.0-1009.10 | 5.19.0-1009.10 |
=22.10 | ||
All of | ||
ubuntu/linux-image-gcp | <5.19.0.1010.9 | 5.19.0.1010.9 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-1010-oracle | <5.19.0-1010.11 | 5.19.0-1010.11 |
=22.10 | ||
All of | ||
ubuntu/linux-image-oracle | <5.19.0.1010.9 | 5.19.0.1010.9 |
=22.10 | ||
All of | ||
ubuntu/linux-image-raspi | <5.19.0.1006.7 | 5.19.0.1006.7 |
=22.10 | ||
All of | ||
ubuntu/linux-image-kvm | <5.19.0.1010.9 | 5.19.0.1010.9 |
=22.10 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <5.19.0.23.22 | 5.19.0.23.22 |
=22.10 | ||
All of | ||
ubuntu/linux-image-lowlatency | <5.19.0.1009.8 | 5.19.0.1009.8 |
=22.10 | ||
All of | ||
ubuntu/linux-image-5.19.0-23-generic-lpae | <5.19.0-23.24 | 5.19.0-23.24 |
=22.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of CVE-2022-2602 is high.
To fix CVE-2022-2602, update your Linux kernel to version 5.19.0-1011.12 or later.
The affected software for CVE-2022-2602 includes Ubuntu 22.10 with Linux kernel versions 5.19.0-1011.12 and earlier.
There are no known exploits for CVE-2022-2602 at the moment.
You can find more information about CVE-2022-2602 on the Ubuntu Security website.