
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49533 is a buffer overflow vulnerability discovered in the Linux kernel's ath11k driver. The issue stems from a mismatch between the reported maximum number of SSIDs (16) for active probe requests and the actual capacity of the scanreqparams structure (10 SSIDs). This vulnerability was disclosed and patched in early 2022 (Kernel Git).
The vulnerability occurs in the ath11kmacophwscan route when copying SSIDs into the scanreqparams structure. The driver reports WLANSCANPARAMSMAXSSID as 16, but the structure can only hold 10 SSIDs, leading to a buffer overflow that can overwrite the extraie pointer. The firmware actually supports 16 SSID * 4 BSSID combinations, allowing for a total of 64 probe requests (Kernel Git).
The buffer overflow vulnerability can be triggered from wpa_supplicant in userspace, potentially leading to memory corruption and system instability. The issue affects the Linux kernel's wireless networking capabilities, specifically the ath11k driver used for Qualcomm Atheros wireless devices (NVD).
The issue has been resolved by adjusting the maximum SSID and BSSID values to match firmware capabilities, setting them to 16 and 4 respectively, and removing redundant macros. The fix has been implemented in the Linux kernel through a patch that modifies the ath11k driver (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."