CVE-2023-52594

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() Fix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug occurs when txs->cnt, data from a URB provided by a USB device, is bigger than the size of the array txs->txstatus, which is HTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug handling code after the check. Make the function return if that is the case. Found by a modified version of syzkaller. UBSAN: array-index-out-of-bounds in htc_drv_txrx.c index 13 is out of range for type '__wmi_event_txstatus [12]' Call Trace: ath9k_htc_txstatus ath9k_wmi_event_tasklet tasklet_action_common __do_softirq irq_exit_rxu sysvec_apic_timer_interrupt
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

12 Dec 2024, 15:10

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234 - () https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234 - Patch
References () https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348 - () https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348 - Patch
References () https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1 - () https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1 - Patch
References () https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9 - () https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9 - Patch
References () https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1 - () https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1 - Patch
References () https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d - () https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d - Patch
References () https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225 - () https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225 - Patch
References () https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc - () https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-129
First Time Linux
Linux linux Kernel

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234 - () https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234 -
References () https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348 - () https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348 -
References () https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1 - () https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1 -
References () https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9 - () https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9 -
References () https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1 - () https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1 -
References () https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d - () https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d -
References () https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225 - () https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225 -
References () https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc - () https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc -

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

06 Mar 2024, 15:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath9k: corrige una posible lectura de índice de matriz fuera de los límites en ath9k_htc_txstatus(). Corrige una lectura de índice de matriz fuera de los límites en ath9k_htc_txstatus(). El error ocurre cuando txs->cnt, los datos de una URB proporcionados por un dispositivo USB, son mayores que el tamaño de la matriz txs->txstatus, que es HTC_MAX_TX_STATUS. WARN_ON() ya lo verifica, pero no hay ningún código de manejo de errores después de la verificación. Haga que la función regrese si ese es el caso. Encontrado por una versión modificada de syzkaller. UBSAN: Array-Index-Of-Bunds en htc_drv_txrx.c El índice 13 está fuera de rango para el tipo '__WMI_EVENT_TXSTATUS [12]' LLAME TRACE: ATH9K_HTC_TXSTATUS ATH9K_WMI_EVENT_TASKLET_ACTION_ACTION_COMNOMON __DO_SOFTIRQ IRQITITI

06 Mar 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 07:15

Updated : 2024-12-12 15:10


NVD link : CVE-2023-52594

Mitre link : CVE-2023-52594

CVE.ORG link : CVE-2023-52594


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index