First published: Thu Oct 13 2022(Updated: )
A list corruption flaw was found in cfg80211_add_nontrans_list in the net/wireless/scan.c function in the Linux kernel. This flaw could lead to a denial of service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 | |
Linux Kernel | >=5.1<5.19.16 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-42721 is classified as a denial of service vulnerability in the Linux kernel.
To mitigate CVE-2022-42721, update to kernel version 5.19.16 or later, or apply the relevant patches provided by your distribution.
CVE-2022-42721 affects Linux kernel versions from 5.1 to 5.19.x prior to 5.19.16, as well as specific versions of Red Hat, Fedora, and Debian distributions.
The impact of CVE-2022-42721 includes potential denial of service due to a list corruption flaw in the kernel.
CVE-2022-42721 can potentially be exploited by local users to cause a denial of service.