CVE-2022-49503
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix The "rxstatus->rs_keyix" eventually gets passed to test_bit() so we need to ensure that it is within the bitmap. drivers/net/wireless/ath/ath9k/common.c:46 ath9k_cmn_rx_accept() error: passing untrusted data 'rx_stats->rs_keyix' to 'test_bit()'Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 3.15 ≤ 𝑥 < 4.9.318 |
| linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.283 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.247 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.198 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.121 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.46 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.17.14 |
| linux | linux_kernel | 5.18 ≤ 𝑥 < 5.18.3 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References