CVE-2022-49503

Source
https://cve.org/CVERecord?id=CVE-2022-49503
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49503.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49503
Downstream
Related
Published
2025-02-26T02:13:36.149Z
Modified
2026-03-20T12:24:35.661690Z
Summary
ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix
Details

In the Linux kernel, the following vulnerability has been resolved:

ath9khtc: fix potential out of bounds access with invalid rxstatus->rskeyix

The "rxstatus->rskeyix" eventually gets passed to testbit() so we need to ensure that it is within the bitmap.

drivers/net/wireless/ath/ath9k/common.c:46 ath9kcmnrxaccept() error: passing untrusted data 'rxstats->rskeyix' to 'testbit()'

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49503.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4ed1a8d4a25711f780b96920fff2bb531229e322
Fixed
0bcb528402cd5e1a6e1833e956fd58a12d509e8e
Fixed
a048e0c3caa852397b7b50d4c82a0415c05f7ac3
Fixed
4bdcf32c965c27f55ccc4ee71c1927131115b0bb
Fixed
2326d398ccd41ba6d93b8346532dfa432ab00fee
Fixed
461e4c1f199076275f16bf6f3d3e42c6b6c79f33
Fixed
7f6defe0fabc79f29603c6fa3c80e4fe0456a3e9
Fixed
eda518db7db16c360bc84379d90675650daa3048
Fixed
3dad3fed5672828c7fb0465cb66a3d9a70952fa6
Fixed
2dc509305cf956381532792cb8dceef2b1504765

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49503.json"