A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.
https://www.debian.org/security/2022/dsa-5257
https://security.netapp.com/advisory/ntap-20230203-0008/
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
https://bugzilla.suse.com/show_bug.cgi?id=1204051
http://www.openwall.com/lists/oss-security/2022/10/13/5
http://www.openwall.com/lists/oss-security/2022/10/13/2
http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html