A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
https://lore.kernel.org/lkml/87ilqc7jv9.fsf%40kernel.org/t/ | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220629-0007/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2022-05-16T00:00:00
Updated: 2022-11-01T00:00:00
Reserved: 2022-05-12T00:00:00
Link: CVE-2022-1679
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-16T18:15:08.410
Modified: 2024-01-19T17:52:18.347
Link: CVE-2022-1679
JSON object: View
Redhat Information
No data.
CWE