In the Linux kernel, the following vulnerability has been resolved:
ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix
The "rxstatus->rs_keyix" eventually gets passed to test_bit() so we need to
ensure that it is within the bitmap.
drivers/net/wireless/ath/ath9k/common.c:46 ath9k_cmn_rx_accept()
error: passing untrusted data 'rx_stats->rs_keyix' to 'test_bit()'
References
Configurations
Configuration 1 (hide)
|
History
21 Oct 2025, 12:09
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/0bcb528402cd5e1a6e1833e956fd58a12d509e8e - Patch | |
| References | () https://git.kernel.org/stable/c/2326d398ccd41ba6d93b8346532dfa432ab00fee - Patch | |
| References | () https://git.kernel.org/stable/c/2dc509305cf956381532792cb8dceef2b1504765 - Patch | |
| References | () https://git.kernel.org/stable/c/3dad3fed5672828c7fb0465cb66a3d9a70952fa6 - Patch | |
| References | () https://git.kernel.org/stable/c/461e4c1f199076275f16bf6f3d3e42c6b6c79f33 - Patch | |
| References | () https://git.kernel.org/stable/c/4bdcf32c965c27f55ccc4ee71c1927131115b0bb - Patch | |
| References | () https://git.kernel.org/stable/c/7f6defe0fabc79f29603c6fa3c80e4fe0456a3e9 - Patch | |
| References | () https://git.kernel.org/stable/c/a048e0c3caa852397b7b50d4c82a0415c05f7ac3 - Patch | |
| References | () https://git.kernel.org/stable/c/eda518db7db16c360bc84379d90675650daa3048 - Patch | |
| CWE | CWE-125 | |
| First Time |
Linux
Linux linux Kernel |
26 Feb 2025, 07:01
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-10-21 12:09
NVD link : CVE-2022-49503
Mitre link : CVE-2022-49503
CVE.ORG link : CVE-2022-49503
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
