{"vulnerability": "CVE-2022-42719", "sightings": [{"uuid": "ee5bbd05-b6e2-4a2d-b643-cfde896113fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42719", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16577", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42719\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.\n\ud83d\udccf Published: 2022-10-13T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-15T20:48:06.121Z\n\ud83d\udd17 References:\n1. https://bugzilla.suse.com/show_bug.cgi?id=1204051\n2. http://www.openwall.com/lists/oss-security/2022/10/13/2\n3. http://www.openwall.com/lists/oss-security/2022/10/13/5\n4. https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=ff05d4b45dd89b922578dac497dcabf57cf771c6\n5. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/\n6. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/\n7. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/\n8. https://www.debian.org/security/2022/dsa-5257\n9. https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html\n10. https://security.netapp.com/advisory/ntap-20230203-0008/\n11. http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html", "creation_timestamp": "2025-05-15T21:33:32.000000Z"}, {"uuid": "11de98eb-1f05-45a1-bd4c-61d2b76b6ee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42719", "type": "seen", "source": "https://t.me/cibsecurity/51365", "content": "\u203c CVE-2022-42719 \u203c\n\nA use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.14 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-14T02:28:07.000000Z"}]}