Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-42720

Опубликовано: 14 окт. 2022
Источник: debian
EPSS Низкий

Описание

Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.0.2-1package
linuxnot-affectedbusterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2022/10/13/2

  • https://lore.kernel.org/netdev/20221013100522.46346-1-johannes@sipsolutions.net/T/#u

  • https://github.com/PurpleVsGreen/beacown

EPSS

Процентиль: 43%
0.00204
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.

CVSS3: 7.3
redhat
больше 2 лет назад

Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.

CVSS3: 7.8
nvd
больше 2 лет назад

Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.8
github
больше 2 лет назад

Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.14 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.

EPSS

Процентиль: 43%
0.00204
Низкий