Description
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.
References (4)
Core 4
Core References
Patch, Third Party Advisory
https://github.com/torvalds/linux/commit/051ae669e4505abbe05165bebf6be7922de11f41
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230113-0007/
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
Scores
CVSS v3
7.8
EPSS
0.0014
EPSS Percentile
32.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-787
Status
published
Products (7)
debian/debian_linux
10.0
linux/linux_kernel
4.2 - 5.10.157
netapp/h300s_firmware
netapp/h410c_firmware
netapp/h410s_firmware
netapp/h500s_firmware
netapp/h700s_firmware
Published
Dec 18, 2022
Tracked Since
Feb 18, 2026