Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-42721

Опубликовано: 14 окт. 2022
Источник: debian
EPSS Низкий

Описание

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.0.2-1package
linuxnot-affectedbusterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2022/10/13/2

  • https://lore.kernel.org/netdev/20221013100522.46346-1-johannes@sipsolutions.net/T/#u

  • https://github.com/PurpleVsGreen/beacown

EPSS

Процентиль: 23%
0.00075
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 2 лет назад

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

CVSS3: 5.5
redhat
больше 2 лет назад

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

CVSS3: 5.5
nvd
больше 2 лет назад

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

CVSS3: 5.5
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 5.5
github
больше 2 лет назад

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.14 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.

EPSS

Процентиль: 23%
0.00075
Низкий