In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()
len is extracted from HTT message and could be an unexpected value in
case errors happen, so add validation before using to avoid possible
out-of-bound read in the following message iteration and parsing.
The same issue also applies to ppdu_info->ppdu_stats.common.num_users,
so validate it before using too.
These are found during code review.
Compile test only.
Metrics
Affected Vendors & Products
References
History
Fri, 29 Nov 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2024-12-19T08:26:44.145Z
Reserved: 2024-05-21T15:19:24.251Z
Link: CVE-2023-52827

Updated: 2024-08-02T23:11:36.061Z

Status : Modified
Published: 2024-05-21T16:15:20.463
Modified: 2024-11-21T08:40:40.303
Link: CVE-2023-52827
