CVE-2022-42722 Local attackers could inject WLAN frames into the mac80211 stack to cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.

This has been fixed in the 5.20 kernel.

In the Linux kernel before version 4.14, there is a NULL pointer dereference in the set_bdev() function in the ext4 filesystem if an attempt is made to mount an ext4 file system on top of tmpfs or ramfs.
This has been fixed in the 4.14 kernel.

There are four primary ways in which a Linux system can be exploited: By a local user By a remote user By a local malicious application By a remote malicious application

Linux does not limit access to the system or files to a single user, group or type of entity. The system can be accessed by any user on the system, as well as any group of users, as well as by any application.
There are also no restrictions on the type of entity that can access the system or files, including remote malicious applications, local malicious applications and remote malicious applications.

A local user can gain access to the system by exploiting a flaw in the system itself. These include the system administrator failing to implement the necessary safeguards, such as not setting a root password or not enabling administrative accounts, not enabling the firewall to filter out network connections, not disabling the DHCP server to disable network access, not applying patches to the system or not updating the system, etc.
A remote user can gain access to the system by exploiting a flaw in the system itself, as well as by exploiting a flaw in the network

How to achieve remote exploitation on a Linux system

There is no specific method for remote exploitation on a Linux system. However, the following general methods can be used to exploit a remote Linux system: By exploiting a flaw in the network (see: How to achieve remote exploitation on a Linux system) By exploiting a flaw in the system itself

Local malicious applications can gain access to the system

Linux does not prevent local malicious applications from gaining access to the system. Local malicious applications can gain access to the system by exploiting a flaw in the system itself, as well as by exploiting a flaw in the network
A remote malicious application can gain access to the system by exploiting a flaw in the system itself, as well as by exploiting a flaw in the network.

Linux does not limit access to the system or files to a single user, group or type of entity

Linux does not limit access to the system or files to a single user, group or type of entity. The system can be accessed by any user on the system, as well as any group of users, as well as by any application. There are also no restrictions on the type of entity that can access the system or files, including remote malicious applications, local malicious applications and remote malicious applications.

The local attacker can exploit a flaw in the system itself

A local attacker can exploit a flaw in the system itself. These include the system administrator failing to implement the necessary safeguards, such as not setting a root password or not enabling administrative accounts, not enabling the firewall to filter out network connections, not disabling the DHCP server to disable network access, not applying patches to the system or not updating the system, etc.
A remote attacker can exploit a flaw in the system itself, as well as by exploiting a flaw in the network.

References