We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49023

wifi: cfg80211: fix buffer overflow in elem comparison



Description

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix buffer overflow in elem comparison For vendor elements, the code here assumes that 5 octets are present without checking. Since the element itself is already checked to fit, we only need to check the length.

Reserved 2024-08-22 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

0b8fb8235be8be99a197e8d948fc0a2df8dc261a before f5c2ec288a865dbe3706b09bed12302e9f6d696b
affected

0b8fb8235be8be99a197e8d948fc0a2df8dc261a before 9e6b79a3cd17620d467311b30d56f2648f6880aa
affected

0b8fb8235be8be99a197e8d948fc0a2df8dc261a before 88a6fe3707888bd1893e9741157a7035c4159ab6
affected

0b8fb8235be8be99a197e8d948fc0a2df8dc261a before 391cb872553627bdcf236c03ee7d5adb275e37e1
affected

0b8fb8235be8be99a197e8d948fc0a2df8dc261a before 9f16b5c82a025cd4c864737409234ddc44fb166a
affected

Default status
affected

5.1
affected

Any version before 5.1
unaffected

5.4.226
unaffected

5.10.158
unaffected

5.15.82
unaffected

6.0.12
unaffected

6.1
unaffected

References

git.kernel.org/...c/f5c2ec288a865dbe3706b09bed12302e9f6d696b

git.kernel.org/...c/9e6b79a3cd17620d467311b30d56f2648f6880aa

git.kernel.org/...c/88a6fe3707888bd1893e9741157a7035c4159ab6

git.kernel.org/...c/391cb872553627bdcf236c03ee7d5adb275e37e1

git.kernel.org/...c/9f16b5c82a025cd4c864737409234ddc44fb166a

cve.org (CVE-2022-49023)

nvd.nist.gov (CVE-2022-49023)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-49023

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.