{ "schema_version": "1.4.0", "id": "GHSA-pvrf-2wf8-jrqv", "modified": "2025-04-17T15:32:25Z", "published": "2022-12-18T06:31:09Z", "aliases": [ "CVE-2022-47519" ], "details": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47519" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/051ae669e4505abbe05165bebf6be7922de11f41" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html" }, { "type": "WEB", "url": "https://lore.kernel.org/r/20221123153543.8568-3-philipturnbull%40github.com" }, { "type": "WEB", "url": "https://lore.kernel.org/r/20221123153543.8568-3-philipturnbull@github.com" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20230113-0007" } ], "database_specific": { "cwe_ids": [ "CWE-787" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-12-18T06:15:00Z" } }