ghsa-c7x4-x4qg-qxjh
Vulnerability from github
Published
2025-06-18 12:30
Modified
2025-06-18 12:30
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()

As a result of the execution of the inner while loop, the value of 'idx' can be equal to LINK_QUAL_MAX_RETRY_NUM. However, this is not checked after the loop and 'idx' is used to write the LINK_QUAL_MAX_RETRY_NUM size array 'lq_cmd->rs_table[idx]' below in the outer loop.

The fix is to check the new value of 'idx' inside the nested loop, and break both loops if index equals the size. Checking it at the start is now pointless, so let's remove it.

Detected using the static analysis tool - Svace.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2022-50180"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-06-18T11:15:48Z",
    "severity": null
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()\n\nAs a result of the execution of the inner while loop, the value\nof \u0027idx\u0027 can be equal to LINK_QUAL_MAX_RETRY_NUM. However, this\nis not checked after the loop and \u0027idx\u0027 is used to write the\nLINK_QUAL_MAX_RETRY_NUM size array \u0027lq_cmd-\u003ers_table[idx]\u0027 below\nin the outer loop.\n\nThe fix is to check the new value of \u0027idx\u0027 inside the nested loop,\nand break both loops if index equals the size. Checking it at the\nstart is now pointless, so let\u0027s remove it.\n\nDetected using the static analysis tool - Svace.",
  "id": "GHSA-c7x4-x4qg-qxjh",
  "modified": "2025-06-18T12:30:53Z",
  "published": "2025-06-18T12:30:53Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50180"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/20be29b99dfed089fe7b8698cd18dfdda6049bd7"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/73304c7594080362107bea4c0c3b7da2fb134cc4"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/88b551561ded10017dd846c8aeb2296a5119a915"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/9f1acb3ce0e37e9c38a6060a0570d56d2963e797"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/a8eb8e6f7159c7c20c0ddac428bde3d110890aa7"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/b7c39b1a3d4b8d2ba8c13d5ae1303705b03b46d4"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/e7d6cac6967534e1298497e853964b3d3f994ce3"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/f59e7534e2b11d7c018a412c293897e8417addd4"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…