This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision | Next revisionBoth sides next revision |
| advisory:2022-10-17-1 [2022/10/17 17:20] – overview hauke | advisory:2022-10-17-1 [2022/10/17 18:31] – add CVE links hauke |
|---|
| These vulnerabilities are in the Multi BSSID (MBSSID) parsing code and the P2P-device beacon parsing code. | These vulnerabilities are in the Multi BSSID (MBSSID) parsing code and the P2P-device beacon parsing code. |
| |
| * CVE-2022-41674: fix u8 overflow in cfg80211_update_notlisted_nontrans (max 256 byte overwrite) (RCE) | * [[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674|CVE-2022-41674]]: fix u8 overflow in cfg80211_update_notlisted_nontrans (max 256 byte overwrite) (RCE) |
| * CVE-2022-42719: wifi: mac80211: fix MBSSID parsing use-after-free use after free condition (RCE) | * [[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719|CVE-2022-42719]]: wifi: mac80211: fix MBSSID parsing use-after-free use after free condition (RCE) |
| * CVE-2022-42720: wifi: cfg80211: fix BSS refcounting bugs ref counting use-after-free possibilities (RCE) | * [[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720|CVE-2022-42720]]: wifi: cfg80211: fix BSS refcounting bugs ref counting use-after-free possibilities (RCE) |
| * CVE-2022-42721: wifi: cfg80211: avoid nontransmitted BSS list corruption list corruption (DOS) | * [[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721|CVE-2022-42721]]: wifi: cfg80211: avoid nontransmitted BSS list corruption list corruption (DOS) |
| * CVE-2022-42722: wifi: mac80211: fix crash in beacon protection for P2P-device NULL ptr dereference crash (DOS) | * [[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722|CVE-2022-42722]]: wifi: mac80211: fix crash in beacon protection for P2P-device NULL ptr dereference crash (DOS) |
| |
| ===== REQUIREMENTS ===== | ===== REQUIREMENTS ===== |