[USN-5708-1] backport-iwlwifi-dkms vulnerabilities
Several security issues were fixed in backport-iwlwifi-dkms.
Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)
Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)
Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.10.
(CVE-2022-42722)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/backport-iwlwifi-dkms?distro=kinetic | < 9904-0ubuntu3.1 |
pkg:deb/ubuntu/backport-iwlwifi-dkms?distro=jammy | < 9858-0ubuntu3.1 |
pkg:deb/ubuntu/backport-iwlwifi-dkms?distro=focal | < 8324-0ubuntu3~20.04.5 |
- ID
- USN-5708-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-5708-1
- Published
-
2022-11-01T13:15:44
(22 months ago) - Modified
-
2022-11-01T13:15:44
(22 months ago) - Other Advisories
-
- ALPINE:CVE-2022-41674
- ALPINE:CVE-2022-42719
- ALPINE:CVE-2022-42720
- ALPINE:CVE-2022-42721
- ALPINE:CVE-2022-42722
- ALSA-2023:2458
- ALSA-2023:2951
- ASA-202210-1
- ASA-202210-2
- ASA-202210-3
- ASA-202210-4
- DSA-5257-1
- ELSA-2023-2458
- ELSA-2023-2951
- FEDORA-2022-1a5b125ac6
- FEDORA-2022-2cfbe17910
- FEDORA-2022-b948fc3cfb
- MS:CVE-2022-41674
- MS:CVE-2022-42719
- MS:CVE-2022-42720
- MS:CVE-2022-42721
- MS:CVE-2022-42722
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- SSA:2022-333-01
- SUSE-SU-2022:3601-1
- SUSE-SU-2022:3605-1
- SUSE-SU-2022:3606-1
- SUSE-SU-2022:3607-1
- SUSE-SU-2022:3628-1
- SUSE-SU-2022:3648-1
- SUSE-SU-2022:3657-1
- SUSE-SU-2022:3704-1
- SUSE-SU-2022:3775-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3844-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3976-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4033-1
- SUSE-SU-2022:4034-1
- SUSE-SU-2022:4035-1
- SUSE-SU-2022:4037-1
- SUSE-SU-2022:4039-1
- SUSE-SU-2022:4100-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4617-1
- USN-5691-1
- USN-5692-1
- USN-5693-1
- USN-5700-1
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5752-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/backport-iwlwifi-dkms?distro=kinetic | ubuntu | backport-iwlwifi-dkms | < 9904-0ubuntu3.1 | kinetic | ||
Affected | pkg:deb/ubuntu/backport-iwlwifi-dkms?distro=jammy | ubuntu | backport-iwlwifi-dkms | < 9858-0ubuntu3.1 | jammy | ||
Affected | pkg:deb/ubuntu/backport-iwlwifi-dkms?distro=focal | ubuntu | backport-iwlwifi-dkms | < 8324-0ubuntu3~20.04.5 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |