WID-SEC-W-2022-1716
Vulnerability from csaf_certbund - Published: 2022-10-13 22:00 - Updated: 2024-03-06 23:00Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht aufgrund eines Pufferüberlaufs in der WiFi-Subkomponente. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und möglicherweise vertrauliche Informationen offenzulegen.
Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer use-after-free-Fehler in bss_ref_get in net/wireless/scan.c und net/mac80211/util.c des multi-BSSID-Elements. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand auszulösen und möglicherweise beliebigen Code auszuführen.
Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer use-after-free-Fehler in bss_ref_get in net/wireless/scan.c und net/mac80211/util.c des multi-BSSID-Elements. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand auszulösen und möglicherweise beliebigen Code auszuführen.
Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer Listenverfälschung in der Funktion net/wireless/scan.c und im P2P-Device in wifi in der Funktion net/mac80211/rx.c. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.
Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer Listenverfälschung in der Funktion net/wireless/scan.c und im P2P-Device in wifi in der Funktion net/mac80211/rx.c. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und m\u00f6glicherweise beliebigen Code auszuf\u00fchren oder vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1716 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1716.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1716 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1716"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2134377 vom 2022-10-13",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2134440 vom 2022-10-13",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134440"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2134451 vom 2022-10-13",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2134506 vom 2022-10-13",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2134517 vom 2022-10-13",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-202210-4 vom 2022-10-14",
"url": "https://security.archlinux.org/ASA-202210-4"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-202210-3 vom 2022-10-14",
"url": "https://security.archlinux.org/ASA-202210-3"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-202210-2 vom 2022-10-14",
"url": "https://security.archlinux.org/ASA-202210-2"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-202210-1 vom 2022-10-14",
"url": "https://security.archlinux.org/ASA-202210-1"
},
{
"category": "external",
"summary": "Mailing list OSS Security vom 2022-10-17",
"url": "https://www.openwall.com/lists/oss-security/2022/10/13/5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3601-1 vom 2022-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3605-1 vom 2022-10-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3606-1 vom 2022-10-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3607-1 vom 2022-10-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3648-1 vom 2022-10-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3628-1 vom 2022-10-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5257 vom 2022-10-18",
"url": "https://lists.debian.org/debian-security-announce/2022/msg00226.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5693-1 vom 2022-10-20",
"url": "https://ubuntu.com/security/notices/USN-5693-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3657-1 vom 2022-10-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5691-1 vom 2022-10-20",
"url": "https://ubuntu.com/security/notices/USN-5691-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5692-1 vom 2022-10-20",
"url": "https://ubuntu.com/security/notices/USN-5692-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3704-1 vom 2022-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5700-1 vom 2022-10-26",
"url": "https://ubuntu.com/security/notices/USN-5700-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3775-1 vom 2022-10-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3809-1 vom 2022-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3844-1 vom 2022-11-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3173 vom 2022-11-01",
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5708-1 vom 2022-11-01",
"url": "https://ubuntu.com/security/notices/USN-5708-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3897-1 vom 2022-11-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3976-1 vom 2022-11-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3998-1 vom 2022-11-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5728-1 vom 2022-11-17",
"url": "https://ubuntu.com/security/notices/USN-5728-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4034-1 vom 2022-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4037-1 vom 2022-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012956.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0090-1 vom 2022-11-16",
"url": "https://ubuntu.com/security/notices/LSN-0090-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4035-1 vom 2022-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4033-1 vom 2022-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4039-1 vom 2022-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5729-2 vom 2022-11-18",
"url": "https://ubuntu.com/security/notices/USN-5728-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4113-1 vom 2022-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4100-1 vom 2022-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5728-3 vom 2022-11-29",
"url": "https://ubuntu.com/security/notices/USN-5728-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5752-1 vom 2022-11-30",
"url": "https://ubuntu.com/security/notices/USN-5752-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-10081 vom 2022-12-13",
"url": "http://linux.oracle.com/errata/ELSA-2022-10081.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4617-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-12009 vom 2023-01-10",
"url": "http://linux.oracle.com/errata/ELSA-2023-12009.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0091-1 vom 2023-02-14",
"url": "https://ubuntu.com/security/notices/LSN-0091-1"
},
{
"category": "external",
"summary": "Sophos UTM Up2date 9.715 vom 2023-03-13",
"url": "https://community.sophos.com/utm-firewall/b/blog/posts/utm-up2date-9-715-released"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2458 vom 2023-05-09",
"url": "https://access.redhat.com/errata/RHSA-2023:2458"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2148 vom 2023-05-09",
"url": "https://access.redhat.com/errata/RHSA-2023:2148"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2736 vom 2023-05-16",
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2951 vom 2023-05-16",
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-2951 vom 2023-06-14",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-June/014107.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-2458 vom 2023-06-28",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-June/014226.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1188 vom 2024-03-06",
"url": "https://access.redhat.com/errata/RHSA-2024:1188"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2024-03-06T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:36:26.654+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-1716",
"initial_release_date": "2022-10-13T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-10-13T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-10-16T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora und Arch Linux aufgenommen"
},
{
"date": "2022-10-17T22:00:00.000+00:00",
"number": "3",
"summary": "PoC aufgenommen"
},
{
"date": "2022-10-18T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2022-10-19T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2022-10-24T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-10-25T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-26T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-10-31T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-01T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE, Debian und Ubuntu aufgenommen"
},
{
"date": "2022-11-08T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-14T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-15T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-16T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2022-11-20T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2022-11-29T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-30T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-13T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-12-26T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-09T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-02-14T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-13T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2023-05-09T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-05-16T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-13T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-06-28T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-03-06T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "27"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9.7 MR15",
"product": {
"name": "Sophos Unified Threat Management (UTM) Software 9.7 MR15",
"product_id": "T026721",
"product_identification_helper": {
"cpe": "cpe:/a:sophos:unified_threat_management_software:9.7_mr15"
}
}
}
],
"category": "product_name",
"name": "Unified Threat Management (UTM) Software"
}
],
"category": "vendor",
"name": "Sophos"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41674",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht aufgrund eines Puffer\u00fcberlaufs in der WiFi-Subkomponente. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und m\u00f6glicherweise vertrauliche Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"T013312",
"T026721",
"T004914"
]
},
"release_date": "2022-10-13T22:00:00.000+00:00",
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-42719",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer use-after-free-Fehler in bss_ref_get in net/wireless/scan.c und net/mac80211/util.c des multi-BSSID-Elements. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand auszul\u00f6sen und m\u00f6glicherweise beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"T013312",
"T026721",
"T004914"
]
},
"release_date": "2022-10-13T22:00:00.000+00:00",
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer use-after-free-Fehler in bss_ref_get in net/wireless/scan.c und net/mac80211/util.c des multi-BSSID-Elements. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand auszul\u00f6sen und m\u00f6glicherweise beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"T013312",
"T026721",
"T004914"
]
},
"release_date": "2022-10-13T22:00:00.000+00:00",
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer Listenverf\u00e4lschung in der Funktion net/wireless/scan.c und im P2P-Device in wifi in der Funktion net/mac80211/rx.c. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"T013312",
"T026721",
"T004914"
]
},
"release_date": "2022-10-13T22:00:00.000+00:00",
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer Listenverf\u00e4lschung in der Funktion net/wireless/scan.c und im P2P-Device in wifi in der Funktion net/mac80211/rx.c. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"T013312",
"T026721",
"T004914"
]
},
"release_date": "2022-10-13T22:00:00.000+00:00",
"title": "CVE-2022-42722"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.