CVE-2022-49023

Source
https://cve.org/CVERecord?id=CVE-2022-49023
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49023.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49023
Downstream
Related
Published
2024-10-21T20:06:29.901Z
Modified
2026-04-11T12:43:28.036409Z
Summary
wifi: cfg80211: fix buffer overflow in elem comparison
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: fix buffer overflow in elem comparison

For vendor elements, the code here assumes that 5 octets are present without checking. Since the element itself is already checked to fit, we only need to check the length.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49023.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0b8fb8235be8be99a197e8d948fc0a2df8dc261a
Fixed
f5c2ec288a865dbe3706b09bed12302e9f6d696b
Fixed
9e6b79a3cd17620d467311b30d56f2648f6880aa
Fixed
88a6fe3707888bd1893e9741157a7035c4159ab6
Fixed
391cb872553627bdcf236c03ee7d5adb275e37e1
Fixed
9f16b5c82a025cd4c864737409234ddc44fb166a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49023.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1.0
Fixed
5.4.226
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.158
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.82
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49023.json"