We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49931

wifi: ath12k: fix array out-of-bound access in SoC stats



Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix array out-of-bound access in SoC stats Currently, the ath12k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath12k_dp_rx_process() function access ath12k_soc_dp_stats::hal_reo_error using the REO destination SRNG ring ID, which is incorrect. SRNG ring ID differ from normal ring ID, and this usage leads to out-of-bounds array access. To fix this issue, modify ath12k_dp_rx_process() to use the normal ring ID directly instead of the SRNG ring ID to avoid out-of-bounds array access. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 before d0e4274d9dc9f8409d56d622cd3ecf7b6fd49e2f
affected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 before a4aef827a41cdaf6201bbaf773c1eae4e20e967b
affected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 before ad791e3ec60cb66c1e4dc121ffbf872df312427d
affected

d889913205cf7ebda905b1e62c5867ed4e39f6c2 before e106b7ad13c1d246adaa57df73edb8f8b8acb240
affected

Default status
affected

6.3
affected

Any version before 6.3
unaffected

6.6.55
unaffected

6.10.14
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/d0e4274d9dc9f8409d56d622cd3ecf7b6fd49e2f

git.kernel.org/...c/a4aef827a41cdaf6201bbaf773c1eae4e20e967b

git.kernel.org/...c/ad791e3ec60cb66c1e4dc121ffbf872df312427d

git.kernel.org/...c/e106b7ad13c1d246adaa57df73edb8f8b8acb240

cve.org (CVE-2024-49931)

nvd.nist.gov (CVE-2024-49931)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-49931

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.