CVE-2023-52827Out-of-bounds Read in Linux

CWE-125Out-of-bounds Read7 documents7 sources
Severity
7.1HIGHNVD
EPSS
0.0%
top 94.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 21
Latest updateMay 22

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats() len is extracted from HTT message and could be an unexpected value in case errors happen, so add validation before using to avoid possible out-of-bound read in the following message iteration and parsing. The same issue also applies to ppdu_info->ppdu_stats.common.num_users, so validate it before using too. These are found during code review. Compi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages6 packages

NVDlinux/linux_kernel6.66.6.3+1
Debianlinux/linux_kernel< 6.6.8-1+1
CVEListV5linux/linuxd889913205cf7ebda905b1e62c5867ed4e39f6c279527c21a3ce04cffc35ea54f74ee087e532be57+3
debiandebian/linux< linux 6.6.8-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-52827: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats() len i2024-05-21
GHSA
GHSA-29xq-869p-3chq: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats() len2024-05-21

📋Vendor Advisories

3
Red Hat
kernel: wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()2024-05-21
Microsoft
wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()2024-05-14
Debian
CVE-2023-52827: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath12...2023

💬Community

1
Bugzilla
CVE-2023-52827 kernel: wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()2024-05-22