Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix buffer overflow in elem comparison For vendor elements, the code here assumes that 5 octets are present without checking. Since the element itself is already checked to fit, we only need to check the length.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.1, < 5.4.226 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/391cb872553627bdcf236c03ee7d5adb275e37e1Patch
- https://git.kernel.org/stable/c/88a6fe3707888bd1893e9741157a7035c4159ab6Patch
- https://git.kernel.org/stable/c/9e6b79a3cd17620d467311b30d56f2648f6880aaPatch
- https://git.kernel.org/stable/c/9f16b5c82a025cd4c864737409234ddc44fb166aPatch
- https://git.kernel.org/stable/c/f5c2ec288a865dbe3706b09bed12302e9f6d696bPatch
FAQ
What is CVE-2022-49023?
CVE-2022-49023 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix buffer overflow in elem comparison For vendor elements, the code here assumes that 5 octets are present withou...
How severe is CVE-2022-49023?
CVE-2022-49023 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49023?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.