First published: Wed Mar 22 2023(Updated: )
A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.37<4.9.328 | |
Linux Kernel | >=4.10<4.14.293 | |
Linux Kernel | >=4.15<4.19.258 | |
Linux Kernel | >=4.20<5.4.213 | |
Linux Kernel | >=5.5<5.10.142 | |
Linux Kernel | >=5.11<5.15.66 | |
Linux Kernel | >=5.16<5.19.8 | |
Linux Kernel | =6.0-rc1 | |
Linux Kernel | =6.0-rc2 | |
Linux Kernel | =6.0-rc3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4095 is categorized as a high-severity vulnerability due to its potential for local denial of service and privilege escalation.
To mitigate CVE-2022-4095, users should update their Linux kernel to a version greater than 5.19.2 or apply patches provided in recent security advisories.
CVE-2022-4095 affects Linux kernel versions before 5.19.2, including multiple previous versions ranging from 2.6.37 up to 5.19.1.
CVE-2022-4095 cannot be exploited remotely, as it requires local access to the vulnerable system.
The implications of CVE-2022-4095 include the potential for attackers to cause a denial of service and gain elevated privileges on affected systems.