CVE-2023-52829

Published at:
2024-05-21T16:15:20.600
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Global infos:

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps() reg_cap.phy_id is extracted from WMI event and could be an unexpected value in case some errors happen. As a result out-of-bound write may occur to soc->hal_reg_cap. Fix it by validating reg_cap.phy_id before using it. This is found during code review. Compile tested only.

CVE Status: Awaiting Analysis

References:

  • 416baaa9-dc9f-4396-8d5f-8c081fb06d67
  • 416baaa9-dc9f-4396-8d5f-8c081fb06d67
  • 416baaa9-dc9f-4396-8d5f-8c081fb06d67
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    AttributeValue
    Attack ComplexityLOW
    Attack VectorLOCAL
    Availability ImpactHIGH
    Base Score6.2
    Base SeverityMEDIUM
    Confidentiality ImpactNONE
    Integrity ImpactNONE
    Privileges RequiredNONE
    ScopeUNCHANGED
    User InteractionNONE
    Vector StringCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Exploitability Score2.5
    Impact Score3.6
    Source134c704f-9b21-4f2e-91b3-4a467353bcc0
    TypeSecondary

    Links:

    Exploit-db
    Github