Bug 2373663 (CVE-2022-50180) - CVE-2022-50180 kernel: wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()
Summary: CVE-2022-50180 kernel: wifi: iwlegacy: 4965: fix potential off-by-one overflo...
Keywords:
Status: NEW
Alias: CVE-2022-50180
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-18 12:12 UTC by OSIDB Bzimport
Modified: 2025-08-20 11:43 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-18 12:12:49 UTC
In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()

As a result of the execution of the inner while loop, the value
of 'idx' can be equal to LINK_QUAL_MAX_RETRY_NUM. However, this
is not checked after the loop and 'idx' is used to write the
LINK_QUAL_MAX_RETRY_NUM size array 'lq_cmd->rs_table[idx]' below
in the outer loop.

The fix is to check the new value of 'idx' inside the nested loop,
and break both loops if index equals the size. Checking it at the
start is now pointless, so let's remove it.

Detected using the static analysis tool - Svace.

Comment 1 Avinash Hanwate 2025-06-18 19:58:52 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025061832-CVE-2022-50180-06ed@gregkh/T

Comment 3 TEJ RATHI 2025-08-20 11:43:40 UTC
This CVE has been rejected by the Linux kernel community. Refer to the announcement: https://lore.kernel.org/linux-cve-announce/2025061801-REJECTED-da78@gregkh/

Comment added by: Automated Script


Note You need to log in before you can comment on or make changes to this bug.