GHSA-C7X4-X4QG-QXJH
Vulnerability from github – Published: 2025-06-18 12:30 – Updated: 2025-06-18 12:30
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()
As a result of the execution of the inner while loop, the value of 'idx' can be equal to LINK_QUAL_MAX_RETRY_NUM. However, this is not checked after the loop and 'idx' is used to write the LINK_QUAL_MAX_RETRY_NUM size array 'lq_cmd->rs_table[idx]' below in the outer loop.
The fix is to check the new value of 'idx' inside the nested loop, and break both loops if index equals the size. Checking it at the start is now pointless, so let's remove it.
Detected using the static analysis tool - Svace.
{
"affected": [],
"aliases": [
"CVE-2022-50180"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-06-18T11:15:48Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()\n\nAs a result of the execution of the inner while loop, the value\nof \u0027idx\u0027 can be equal to LINK_QUAL_MAX_RETRY_NUM. However, this\nis not checked after the loop and \u0027idx\u0027 is used to write the\nLINK_QUAL_MAX_RETRY_NUM size array \u0027lq_cmd-\u003ers_table[idx]\u0027 below\nin the outer loop.\n\nThe fix is to check the new value of \u0027idx\u0027 inside the nested loop,\nand break both loops if index equals the size. Checking it at the\nstart is now pointless, so let\u0027s remove it.\n\nDetected using the static analysis tool - Svace.",
"id": "GHSA-c7x4-x4qg-qxjh",
"modified": "2025-06-18T12:30:53Z",
"published": "2025-06-18T12:30:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50180"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/20be29b99dfed089fe7b8698cd18dfdda6049bd7"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/73304c7594080362107bea4c0c3b7da2fb134cc4"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/88b551561ded10017dd846c8aeb2296a5119a915"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/9f1acb3ce0e37e9c38a6060a0570d56d2963e797"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a8eb8e6f7159c7c20c0ddac428bde3d110890aa7"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b7c39b1a3d4b8d2ba8c13d5ae1303705b03b46d4"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e7d6cac6967534e1298497e853964b3d3f994ce3"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f59e7534e2b11d7c018a412c293897e8417addd4"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…