{"id":148330,"date":"2022-10-17T07:22:46","date_gmt":"2022-10-17T12:22:46","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/10\/5-critical-remote-code-execution-vulnerabilities-in-linux-kernel-patch-immediately"},"modified":"2022-10-17T07:22:46","modified_gmt":"2022-10-17T12:22:46","slug":"5-critical-remote-code-execution-vulnerabilities-in-linux-kernel-patch-immediately","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/10\/5-critical-remote-code-execution-vulnerabilities-in-linux-kernel-patch-immediately","title":{"rendered":"5 critical remote code execution vulnerabilities in Linux kernel.!Patch immediately!"},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/-plvKXjb_CY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>The Linux kernel WiFi stack has five serious <a href=\"https:\/\/www.securitynewspaper.com\/2022\/10\/04\/3-critical-malicious-code-execution-vulnerabilities-in-linux-kernel\/\" target=\"_blank\" rel=\"noreferrer noopener\">flaws<\/a>, according to <a href=\"https:\/\/seclists.org\/oss-sec\/2022\/q4\/23\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">research<\/a>, which a hacker might use to execute arbitrary code or inflict a denial of service.<\/p>\n<p>The vulnerability, identified as CVE-2022\u201342719, was brought on by a use-after-free issue in the multi-BSSID element\u2019s ieee802 11 parse elems full function of net\/mac80211\/util.c. A remote authenticated adversary might leverage this issue to execute arbitrary code or bring down the system by sending a carefully crafted request. In v5.2-rc1, the CVE-2022\u201342719 vulnerability was first made public.<\/p>\n<p>The vulnerability, identified as CVE-2022\u201342720, was produced about by a use-after-free issue in the multi-BSSID part of the bss ref get function in net\/wireless\/scan.c. A remote authenticated adversary might leverage this issue to execute arbitrary code or bring down the system by sending a carefully crafted request.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Linux kernel WiFi stack has five serious flaws, according to research, which a hacker might use to execute arbitrary code or inflict a denial of service. The vulnerability, identified as CVE-2022\u201342719, was brought on by a use-after-free issue in the multi-BSSID element\u2019s ieee802 11 parse elems full function of net\/mac80211\/util.c. A remote authenticated adversary [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,418],"tags":[],"class_list":["post-148330","post","type-post","status-publish","format-standard","hentry","category-computing","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/148330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=148330"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/148330\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=148330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=148330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=148330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}