Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-42721

Опубликовано: 14 окт. 2022
Источник: debian
EPSS Низкий

Описание

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.0.2-1package
linuxnot-affectedbusterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2022/10/13/2

  • https://lore.kernel.org/netdev/20221013100522.46346-1-johannes@sipsolutions.net/T/#u

  • https://github.com/PurpleVsGreen/beacown

EPSS

Процентиль: 27%
0.00093
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 3 года назад

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

CVSS3: 5.5
redhat
почти 3 года назад

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

CVSS3: 5.5
nvd
почти 3 года назад

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

CVSS3: 5.5
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 5.5
github
почти 3 года назад

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.14 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

EPSS

Процентиль: 27%
0.00093
Низкий