
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49023 is a buffer overflow vulnerability discovered in the Linux kernel's wifi cfg80211 component. The vulnerability affects the element comparison functionality in the wireless network scanning implementation. The issue was identified when the code assumed 5 octets were present in vendor elements without proper length verification (Kernel Git).
The vulnerability exists in the cfg80211gennew_ie function within net/wireless/scan.c. The code incorrectly assumed that 5 octets were present in vendor elements without performing proper length checking. While the element itself was already checked to fit, the specific length verification for the vendor elements was missing. This could lead to a buffer overflow condition when processing vendor-specific elements during wireless scanning operations (Kernel Git).
A buffer overflow vulnerability in the wireless networking stack could potentially allow attackers to cause system crashes or execute arbitrary code through carefully crafted wireless network packets. The vulnerability affects the kernel's ability to safely process vendor-specific elements during wireless network scanning operations (Debian Tracker).
The vulnerability has been fixed in multiple Linux kernel versions. The fix involves adding proper length checking before comparing vendor elements. Fixed versions include Linux kernel 5.10.158-1 for Debian bullseye, 6.1.123-1 for bookworm, and 6.12.12-1 for trixie (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."