In the Linux kernel, the following vulnerability has been...
Unreviewed
Published
Jun 18, 2025
to the GitHub Advisory Database
•
Updated Jun 18, 2025
Description
Published by the National Vulnerability Database
Jun 18, 2025
Published to the GitHub Advisory Database
Jun 18, 2025
Last updated
Jun 18, 2025
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()
As a result of the execution of the inner while loop, the value
of 'idx' can be equal to LINK_QUAL_MAX_RETRY_NUM. However, this
is not checked after the loop and 'idx' is used to write the
LINK_QUAL_MAX_RETRY_NUM size array 'lq_cmd->rs_table[idx]' below
in the outer loop.
The fix is to check the new value of 'idx' inside the nested loop,
and break both loops if index equals the size. Checking it at the
start is now pointless, so let's remove it.
Detected using the static analysis tool - Svace.
References