First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps() reg_cap.phy_id is extracted from WMI event and could be an unexpected value in case some errors happen. As a result out-of-bound write may occur to soc->hal_reg_cap. Fix it by validating reg_cap.phy_id before using it. This is found during code review. Compile tested only.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=6.3<6.5.13 | |
Linux Kernel | >=6.6<6.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52829 has a moderate severity level due to the potential for out-of-bound write vulnerabilities in the Linux kernel.
To fix CVE-2023-52829, update to the latest version of the Linux kernel where this vulnerability has been patched.
CVE-2023-52829 affects various versions of the Linux kernel that utilize the ath12k driver.
Systems running vulnerable versions of the Linux kernel with the ath12k wireless driver are primarily impacted by CVE-2023-52829.
Potential consequences of CVE-2023-52829 include system instability and exploitation leading to unauthorized access or privilege escalation.