In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix out-of-bound access of qmi_invoke_handler()
Currently, there is no terminator entry for ath12k_qmi_msg_handlers hence
facing below KASAN warning,
 ==================================================================
 BUG: KASAN: global-out-of-bounds in qmi_invoke_handler+0xa4/0x148
 Read of size 8 at addr ffffffd00a6428d8 by task kworker/u8:2/1273
 CPU: 0 PID: 1273 Comm: kworker/u8:2 Not tainted 5.4.213 #0
 Workqueue: qmi_msg_handler qmi_data_ready_work
 Call trace:
  dump_backtrace+0x0/0x20c
  show_stack+0x14/0x1c
  dump_stack+0xe0/0x138
  print_address_description.isra.5+0x30/0x330
  __kasan_report+0x16c/0x1bc
  kasan_report+0xc/0x14
  __asan_load8+0xa8/0xb0
  qmi_invoke_handler+0xa4/0x148
  qmi_handle_message+0x18c/0x1bc
  qmi_data_ready_work+0x4ec/0x528
  process_one_work+0x2c0/0x440
  worker_thread+0x324/0x4b8
  kthread+0x210/0x228
  ret_from_fork+0x10/0x18
 The address belongs to the variable:
  ath12k_mac_mon_status_filter_default+0x4bd8/0xfffffffffffe2300 [ath12k]
 [...]
 ==================================================================
Add a dummy terminator entry at the end to assist the qmi_invoke_handler()
in traversing up to the terminator entry without accessing an
out-of-boundary index.
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    17 Sep 2025, 21:05
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://git.kernel.org/stable/c/95575de7dede7b1ed3b9718dab9dda97914ea775 - Patch | |
| References | () https://git.kernel.org/stable/c/a1abdb63628b04855a929850772de97435ed1555 - Patch | |
| References | () https://git.kernel.org/stable/c/b48d40f5840c505b7af700594aa8379eec28e925 - Patch | |
| References | () https://git.kernel.org/stable/c/e1bdff48a1bb4a4ac660c19c55a820968c48b3f2 - Patch | |
| First Time | Linux Linux linux Kernel | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.1 | 
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | CWE-125 | 
21 Nov 2024, 09:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://git.kernel.org/stable/c/95575de7dede7b1ed3b9718dab9dda97914ea775 - | |
| References | () https://git.kernel.org/stable/c/a1abdb63628b04855a929850772de97435ed1555 - | |
| References | () https://git.kernel.org/stable/c/b48d40f5840c505b7af700594aa8379eec28e925 - | |
| References | () https://git.kernel.org/stable/c/e1bdff48a1bb4a4ac660c19c55a820968c48b3f2 - | 
20 Jun 2024, 12:44
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
19 Jun 2024, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-06-19 14:15
Updated : 2025-09-17 21:05
NVD link : CVE-2024-38572
Mitre link : CVE-2024-38572
CVE.ORG link : CVE-2024-38572
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
