8.8
CVSSv3

CVE-2022-42719

Published: 13/10/2022 Updated: 07/11/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 up to and including 5.19.x prior to 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2021-4037 Christian Brauner reported that the inode_init_owner function for the XFS filesystem in the Linux kernel allows local users to create files with an unintended group ownership al ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in backport-iwlwifi-dkms ...
Description<!---->A use-after-free flaw was found in ieee802_11_parse_elems_full in the net/mac80211/utilc function in the multi-BSSID element This issue occurs while parsing in&nbsp;the Linux kernelA use-after-free flaw was found in ieee802_11_parse_elems_full in the net/mac80211/utilc function in the multi-BSSID element This issue occurs whi ...
A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 52 through 51914 could be used by remote attackers who are able to inject WLAN frames to crash the kernel and potentially execute code ...
LTS-102 is being updated in the LTS channel to&nbsp;10205005194&nbsp;(Platform Version:&nbsp;146951730) for most ChromeOS devices Want to know more about Long Term Support? Click&nbsp;hereThis update contains multiple Security fixes, including:1394692&nbsp;High&nbsp;CVE-2022-4437&nbsp;Use after free in Mojo IPC1383991&nbsp;High&nbsp;CVE-2022 ...

Github Repositories

AntiFirewalls PoC Prueba de concepto (PoC) correspondiente al reto "POC CIBERSEGURIDAD: EJECUCIÓN DE CÓDIGO REMOTO EN KERNEL DE LINUX A TRAVÉS DE WIFI" de la competición HackForGood de Telefónica en su edición de octubre de 2022, para la participación del equipo "Anti Firewalls" (código "CR005&quo