摘要:
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix for out-of bound access error
Selfgen stats are placed in a buffer using print_array_to_buf_index() function.
Array length parameter passed to the function is too big, resulting in possible
out-of bound memory error.
Decreasing buffer size by one fixes faulty upper bound of passed array.
Discovered in coverity scan, CID 1600742 and CID 1600758
安全等级: Low
公告ID: KylinSec-SA-2025-1576
发布日期: 2025年3月10日
关联CVE: CVE-2024-58015
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix for out-of bound access error
Selfgen stats are placed in a buffer using print_array_to_buf_index() function.
Array length parameter passed to the function is too big, resulting in possible
out-of bound memory error.
Decreasing buffer size by one fixes faulty upper bound of passed array.
Discovered in coverity scan, CID 1600742 and CID 1600758
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-58015 | KY3.4-5 | kernel | Unaffected |
CVE-2024-58015 | V6 | kernel | Unaffected |