In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: fix buffer overflow in elem comparison
For vendor elements, the code here assumes that 5 octets are present without checking. Since the element itself is already checked to fit, we only need to check the length.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5c2ec288a865dbe3706b09bed12302e9f6d696b",
"target": {
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49023-01908a9f",
"digest": {
"line_hashes": [
"68513803673083898664442855113967381312",
"20393644582928648973514213310546647035",
"163495552724025079004196890828366476486",
"321623852805483769064377521304516143772"
],
"threshold": 0.9
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f16b5c82a025cd4c864737409234ddc44fb166a",
"target": {
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49023-11460efe",
"digest": {
"line_hashes": [
"68513803673083898664442855113967381312",
"20393644582928648973514213310546647035",
"163495552724025079004196890828366476486",
"321623852805483769064377521304516143772"
],
"threshold": 0.9
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@88a6fe3707888bd1893e9741157a7035c4159ab6",
"target": {
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49023-265ad57a",
"digest": {
"line_hashes": [
"68513803673083898664442855113967381312",
"20393644582928648973514213310546647035",
"163495552724025079004196890828366476486",
"321623852805483769064377521304516143772"
],
"threshold": 0.9
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@88a6fe3707888bd1893e9741157a7035c4159ab6",
"target": {
"function": "cfg80211_gen_new_ie",
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49023-30f6520f",
"digest": {
"function_hash": "232965086183021288159687628172043194636",
"length": 1828.0
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@391cb872553627bdcf236c03ee7d5adb275e37e1",
"target": {
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49023-500c6846",
"digest": {
"line_hashes": [
"68513803673083898664442855113967381312",
"20393644582928648973514213310546647035",
"163495552724025079004196890828366476486",
"321623852805483769064377521304516143772"
],
"threshold": 0.9
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9e6b79a3cd17620d467311b30d56f2648f6880aa",
"target": {
"function": "cfg80211_gen_new_ie",
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49023-5bf679f7",
"digest": {
"function_hash": "232965086183021288159687628172043194636",
"length": 1828.0
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f16b5c82a025cd4c864737409234ddc44fb166a",
"target": {
"function": "cfg80211_gen_new_ie",
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49023-90b4e0f3",
"digest": {
"function_hash": "232965086183021288159687628172043194636",
"length": 1828.0
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f5c2ec288a865dbe3706b09bed12302e9f6d696b",
"target": {
"function": "cfg80211_gen_new_ie",
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49023-aa71c911",
"digest": {
"function_hash": "232965086183021288159687628172043194636",
"length": 1828.0
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@391cb872553627bdcf236c03ee7d5adb275e37e1",
"target": {
"function": "cfg80211_gen_new_ie",
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2022-49023-c1de9d62",
"digest": {
"function_hash": "232965086183021288159687628172043194636",
"length": 1828.0
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9e6b79a3cd17620d467311b30d56f2648f6880aa",
"target": {
"file": "net/wireless/scan.c"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49023-ce207620",
"digest": {
"line_hashes": [
"68513803673083898664442855113967381312",
"20393644582928648973514213310546647035",
"163495552724025079004196890828366476486",
"321623852805483769064377521304516143772"
],
"threshold": 0.9
}
}
]