In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: fix buffer overflow in elem comparison
For vendor elements, the code here assumes that 5 octets
are present without checking. Since the element itself is
already checked to fit, we only need to check the length.
References
Configurations
Configuration 1 (hide)
|
History
24 Oct 2024, 03:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* |
|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/391cb872553627bdcf236c03ee7d5adb275e37e1 - Patch | |
References | () https://git.kernel.org/stable/c/88a6fe3707888bd1893e9741157a7035c4159ab6 - Patch | |
References | () https://git.kernel.org/stable/c/9e6b79a3cd17620d467311b30d56f2648f6880aa - Patch | |
References | () https://git.kernel.org/stable/c/9f16b5c82a025cd4c864737409234ddc44fb166a - Patch | |
References | () https://git.kernel.org/stable/c/f5c2ec288a865dbe3706b09bed12302e9f6d696b - Patch |
23 Oct 2024, 15:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Oct 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-21 20:15
Updated : 2024-10-24 03:50
NVD link : CVE-2022-49023
Mitre link : CVE-2022-49023
CVE.ORG link : CVE-2022-49023
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')