{"id":"USN-5780-1","summary":"linux-oem-6.0 vulnerabilities","details":"It was discovered that a memory leak existed in the IPv6 implementation of\nthe Linux kernel. A local attacker could use this to cause a denial of\nservice (memory exhaustion). (CVE-2022-3524)\n\nIt was discovered that the Bluetooth HCI implementation in the Linux kernel\ndid not properly deallocate memory in some situations. An attacker could\npossibly use this cause a denial of service (memory exhaustion).\n(CVE-2022-3619)\n\nIt was discovered that the Broadcom FullMAC USB WiFi driver in the Linux\nkernel did not properly perform bounds checking in some situations. A\nphysically proximate attacker could use this to craft a malicious USB\ndevice that when inserted, could cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2022-3628)\n\nTamás Koczka discovered that the Bluetooth L2CAP implementation in the\nLinux kernel did not properly initialize memory in some situations. A\nphysically proximate attacker could possibly use this to expose sensitive\ninformation (kernel memory). (CVE-2022-42895)\n\nTamás Koczka discovered that the Bluetooth L2CAP handshake implementation\nin the Linux kernel contained multiple use-after-free vulnerabilities. A\nphysically proximate attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2022-42896)\n\n","modified":"2026-02-10T04:42:53Z","published":"2022-12-14T18:00:29Z","related":["UBUNTU-CVE-2022-3524","UBUNTU-CVE-2022-3619","UBUNTU-CVE-2022-3628","UBUNTU-CVE-2022-42895","UBUNTU-CVE-2022-42896"],"upstream":["CVE-2022-3524","CVE-2022-3619","CVE-2022-3628","CVE-2022-42895","CVE-2022-42896","UBUNTU-CVE-2022-3524","UBUNTU-CVE-2022-3619","UBUNTU-CVE-2022-3628","UBUNTU-CVE-2022-42895","UBUNTU-CVE-2022-42896"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5780-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3524"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3619"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3628"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-42895"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-42896"}],"affected":[{"package":{"name":"linux-oem-6.0","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-oem-6.0@6.0.0-1008.8?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0.0-1008.8"}]}],"versions":["6.0.0-1006.6","6.0.0-1007.7"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-6.0.0-1008-oem","binary_version":"6.0.0-1008.8"},{"binary_name":"linux-headers-6.0.0-1008-oem","binary_version":"6.0.0-1008.8"},{"binary_name":"linux-image-unsigned-6.0.0-1008-oem","binary_version":"6.0.0-1008.8"},{"binary_name":"linux-modules-6.0.0-1008-oem","binary_version":"6.0.0-1008.8"},{"binary_name":"linux-modules-iwlwifi-6.0.0-1008-oem","binary_version":"6.0.0-1008.8"},{"binary_name":"linux-oem-6.0-headers-6.0.0-1008","binary_version":"6.0.0-1008.8"},{"binary_name":"linux-oem-6.0-tools-6.0.0-1008","binary_version":"6.0.0-1008.8"},{"binary_name":"linux-oem-6.0-tools-host","binary_version":"6.0.0-1008.8"},{"binary_name":"linux-tools-6.0.0-1008-oem","binary_version":"6.0.0-1008.8"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5780-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-3524","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3619","severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3628","severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-42895","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}