First published: Thu Mar 02 2023(Updated: )
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform bounds checking in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3628) It was discovered that a use-after-free vulnerability existed in the Bluetooth stack in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3640) Khalid Masum discovered that the NILFS2 file system implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-3649) It was discovered that a race condition existed in the SMSC UFX USB driver implementation in the Linux kernel, leading to a use-after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-41849) It was discovered that a race condition existed in the Roccat HID driver in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-41850) Tamás Koczka discovered that the Bluetooth L2CAP implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-42895) It was discovered that the binder IPC implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-20928)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-azure-fde | <5.4.0.1103.109+cvm1.36 | 5.4.0.1103.109+cvm1.36 |
=20.04 | ||
All of | ||
ubuntu/linux-image-5.4.0-1103-azure-fde | <5.4.0-1103.109+cvm1.1 | 5.4.0-1103.109+cvm1.1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is CVE-2022-41849.
The severity of CVE-2022-41849 is not specified in the advisory.
The remedy for CVE-2022-41849 is to upgrade to linux-image-azure-fde version 5.4.0.1103.109+cvm1.36 or higher.
The affected software for this vulnerability is Ubuntu 20.04 with linux-image-azure-fde version 5.4.0.1103.109+cvm1.36.
Yes, you can find more information about CVE-2022-41849 on the Ubuntu security advisory linked in the references.