CVE-2022-49503

In the Linux kernel, the following vulnerability has been resolved: ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix The "rxstatus->rs_keyix" eventually gets passed to test_bit() so we need to ensure that it is within the bitmap. drivers/net/wireless/ath/ath9k/common.c:46 ath9k_cmn_rx_accept() error: passing untrusted data 'rx_stats->rs_keyix' to 'test_bit()'
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Oct 2025, 12:09

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ath9k_htc: se corrige el posible acceso fuera de los límites con rxstatus->rs_keyix no válido. "rxstatus->rs_keyix" finalmente se pasa a test_bit(), por lo que debemos asegurarnos de que esté dentro del mapa de bits. drivers/net/wireless/ath/ath9k/common.c:46 Error ath9k_cmn_rx_accept(): se pasan datos no confiables 'rx_stats->rs_keyix' a 'test_bit()'
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0bcb528402cd5e1a6e1833e956fd58a12d509e8e - () https://git.kernel.org/stable/c/0bcb528402cd5e1a6e1833e956fd58a12d509e8e - Patch
References () https://git.kernel.org/stable/c/2326d398ccd41ba6d93b8346532dfa432ab00fee - () https://git.kernel.org/stable/c/2326d398ccd41ba6d93b8346532dfa432ab00fee - Patch
References () https://git.kernel.org/stable/c/2dc509305cf956381532792cb8dceef2b1504765 - () https://git.kernel.org/stable/c/2dc509305cf956381532792cb8dceef2b1504765 - Patch
References () https://git.kernel.org/stable/c/3dad3fed5672828c7fb0465cb66a3d9a70952fa6 - () https://git.kernel.org/stable/c/3dad3fed5672828c7fb0465cb66a3d9a70952fa6 - Patch
References () https://git.kernel.org/stable/c/461e4c1f199076275f16bf6f3d3e42c6b6c79f33 - () https://git.kernel.org/stable/c/461e4c1f199076275f16bf6f3d3e42c6b6c79f33 - Patch
References () https://git.kernel.org/stable/c/4bdcf32c965c27f55ccc4ee71c1927131115b0bb - () https://git.kernel.org/stable/c/4bdcf32c965c27f55ccc4ee71c1927131115b0bb - Patch
References () https://git.kernel.org/stable/c/7f6defe0fabc79f29603c6fa3c80e4fe0456a3e9 - () https://git.kernel.org/stable/c/7f6defe0fabc79f29603c6fa3c80e4fe0456a3e9 - Patch
References () https://git.kernel.org/stable/c/a048e0c3caa852397b7b50d4c82a0415c05f7ac3 - () https://git.kernel.org/stable/c/a048e0c3caa852397b7b50d4c82a0415c05f7ac3 - Patch
References () https://git.kernel.org/stable/c/eda518db7db16c360bc84379d90675650daa3048 - () https://git.kernel.org/stable/c/eda518db7db16c360bc84379d90675650daa3048 - Patch
CWE CWE-125
First Time Linux
Linux linux Kernel

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-21 12:09


NVD link : CVE-2022-49503

Mitre link : CVE-2022-49503

CVE.ORG link : CVE-2022-49503


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read