Логотип exploitDog
bind:CVE-2022-50180
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-50180

Количество 4

Количество 4

ubuntu логотип

CVE-2022-50180

8 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2022-50180

8 месяцев назад

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2022-50180

8 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-c7x4-x4qg-qxjh

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() As a result of the execution of the inner while loop, the value of 'idx' can be equal to LINK_QUAL_MAX_RETRY_NUM. However, this is not checked after the loop and 'idx' is used to write the LINK_QUAL_MAX_RETRY_NUM size array 'lq_cmd->rs_table[idx]' below in the outer loop. The fix is to check the new value of 'idx' inside the nested loop, and break both loops if index equals the size. Checking it at the start is now pointless, so let's remove it. Detected using the static analysis tool - Svace.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-50180

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

8 месяцев назад
redhat логотип
CVE-2022-50180

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()

CVSS3: 5.5
8 месяцев назад
nvd логотип
CVE-2022-50180

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

8 месяцев назад
github логотип
GHSA-c7x4-x4qg-qxjh

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() As a result of the execution of the inner while loop, the value of 'idx' can be equal to LINK_QUAL_MAX_RETRY_NUM. However, this is not checked after the loop and 'idx' is used to write the LINK_QUAL_MAX_RETRY_NUM size array 'lq_cmd->rs_table[idx]' below in the outer loop. The fix is to check the new value of 'idx' inside the nested loop, and break both loops if index equals the size. Checking it at the start is now pointless, so let's remove it. Detected using the static analysis tool - Svace.

8 месяцев назад

Уязвимостей на страницу