In the Linux kernel, the following vulnerability has been resolved:
ath9khtc: fix potential out of bounds access with invalid rxstatus->rskeyix
The "rxstatus->rskeyix" eventually gets passed to testbit() so we need to ensure that it is within the bitmap.
drivers/net/wireless/ath/ath9k/common.c:46 ath9kcmnrxaccept() error: passing untrusted data 'rxstats->rskeyix' to 'testbit()'
[
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/wireless/ath/ath9k/htc_drv_txrx.c",
"function": "ath9k_rx_prepare"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@461e4c1f199076275f16bf6f3d3e42c6b6c79f33",
"digest": {
"length": 1727.0,
"function_hash": "216974899186379625290224577255351513032"
},
"id": "CVE-2022-49503-6fc08779"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/wireless/ath/ath9k/htc_drv_txrx.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@461e4c1f199076275f16bf6f3d3e42c6b6c79f33",
"digest": {
"line_hashes": [
"29176076651416370492195935794328292866",
"287612309047953311270183454772785585111",
"320985965904451435753303159297916651398"
],
"threshold": 0.9
},
"id": "CVE-2022-49503-aae380fa"
}
]