In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: fix buffer overflow in elem comparison
For vendor elements, the code here assumes that 5 octets are present without checking. Since the element itself is already checked to fit, we only need to check the length.
{ "vanir_signatures": [ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5c2ec288a865dbe3706b09bed12302e9f6d696b", "target": { "file": "net/wireless/scan.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "68513803673083898664442855113967381312", "20393644582928648973514213310546647035", "163495552724025079004196890828366476486", "321623852805483769064377521304516143772" ] }, "id": "CVE-2022-49023-01908a9f", "deprecated": false, "signature_type": "Line", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f16b5c82a025cd4c864737409234ddc44fb166a", "target": { "file": "net/wireless/scan.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "68513803673083898664442855113967381312", "20393644582928648973514213310546647035", "163495552724025079004196890828366476486", "321623852805483769064377521304516143772" ] }, "id": "CVE-2022-49023-11460efe", "deprecated": false, "signature_type": "Line", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@88a6fe3707888bd1893e9741157a7035c4159ab6", "target": { "file": "net/wireless/scan.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "68513803673083898664442855113967381312", "20393644582928648973514213310546647035", "163495552724025079004196890828366476486", "321623852805483769064377521304516143772" ] }, "id": "CVE-2022-49023-265ad57a", "deprecated": false, "signature_type": "Line", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@88a6fe3707888bd1893e9741157a7035c4159ab6", "target": { "file": "net/wireless/scan.c", "function": "cfg80211_gen_new_ie" }, "digest": { "length": 1828.0, "function_hash": "232965086183021288159687628172043194636" }, "id": "CVE-2022-49023-30f6520f", "deprecated": false, "signature_type": "Function", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@391cb872553627bdcf236c03ee7d5adb275e37e1", "target": { "file": "net/wireless/scan.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "68513803673083898664442855113967381312", "20393644582928648973514213310546647035", "163495552724025079004196890828366476486", "321623852805483769064377521304516143772" ] }, "id": "CVE-2022-49023-500c6846", "deprecated": false, "signature_type": "Line", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9e6b79a3cd17620d467311b30d56f2648f6880aa", "target": { "file": "net/wireless/scan.c", "function": "cfg80211_gen_new_ie" }, "digest": { "length": 1828.0, "function_hash": "232965086183021288159687628172043194636" }, "id": "CVE-2022-49023-5bf679f7", "deprecated": false, "signature_type": "Function", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f16b5c82a025cd4c864737409234ddc44fb166a", "target": { "file": "net/wireless/scan.c", "function": "cfg80211_gen_new_ie" }, "digest": { "length": 1828.0, "function_hash": "232965086183021288159687628172043194636" }, "id": "CVE-2022-49023-90b4e0f3", "deprecated": false, "signature_type": "Function", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5c2ec288a865dbe3706b09bed12302e9f6d696b", "target": { "file": "net/wireless/scan.c", "function": "cfg80211_gen_new_ie" }, "digest": { "length": 1828.0, "function_hash": "232965086183021288159687628172043194636" }, "id": "CVE-2022-49023-aa71c911", "deprecated": false, "signature_type": "Function", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@391cb872553627bdcf236c03ee7d5adb275e37e1", "target": { "file": "net/wireless/scan.c", "function": "cfg80211_gen_new_ie" }, "digest": { "length": 1828.0, "function_hash": "232965086183021288159687628172043194636" }, "id": "CVE-2022-49023-c1de9d62", "deprecated": false, "signature_type": "Function", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9e6b79a3cd17620d467311b30d56f2648f6880aa", "target": { "file": "net/wireless/scan.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "68513803673083898664442855113967381312", "20393644582928648973514213310546647035", "163495552724025079004196890828366476486", "321623852805483769064377521304516143772" ] }, "id": "CVE-2022-49023-ce207620", "deprecated": false, "signature_type": "Line", "signature_version": "v1" } ] }