### [CVE-2022-42719](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code. ### POC #### Reference - http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html - http://www.openwall.com/lists/oss-security/2022/10/13/5 #### Github - https://github.com/0xArchy/CR005_AntiFirewalls - https://github.com/ARPSyndicate/cvemon - https://github.com/archyxsec/CR005_AntiFirewalls - https://github.com/karimhabush/cyberowl