
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49471 affects the Linux kernel's rtw89 driver, specifically related to an array-index-out-of-bounds vulnerability in the CFO (Carrier Frequency Offset) tracking functionality. The vulnerability was discovered when hardware reported an incorrect mac_id that could lead to memory pollution (Kernel Git).
The vulnerability occurs in the rtw89/phy.c file where an array-index-out-of-bounds condition was detected at line 2517. The issue manifests when the hardware reports an incorrect mac_id value (specifically index 188) which is out of range for the array type 's32 [64]'. This could lead to memory access beyond the allocated array bounds (Kernel Git).
When exploited, this vulnerability could lead to memory pollution and potential system instability. The out-of-bounds access could result in reading or writing to memory locations outside the intended array boundaries, potentially corrupting system memory (Kernel Git).
The issue has been resolved by adding a bounds check before accessing the array. The fix implements a validation check that verifies if the macid is within the valid range (CFOTRACKMAXUSER) before performing any array operations. If an invalid mac_id is detected, a warning message is logged, and the function returns without performing the problematic array access (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."