In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix possible out-of-bound write in ath12kwmiexthalreg_caps()
regcap.phyid is extracted from WMI event and could be an unexpected value in case some errors happen. As a result out-of-bound write may occur to soc->halregcap. Fix it by validating regcap.phyid before using it.
This is found during code review.
Compile tested only.
[
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4dd0547e8b45faf6f95373be5436b66cde326c0e",
"digest": {
"line_hashes": [
"50277145134936533921689300327704154319",
"39918286408020834604216048217485398929",
"29607160164172624814113172613464258198",
"10429981067607311641693936976068558169"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/wireless/ath/ath12k/wmi.c"
},
"id": "CVE-2023-52829-1abaf953",
"signature_version": "v1",
"signature_type": "Line"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dfe13eaab043130f90dd3d57c7d88577c04adc97",
"digest": {
"line_hashes": [
"50277145134936533921689300327704154319",
"39918286408020834604216048217485398929",
"29607160164172624814113172613464258198",
"10429981067607311641693936976068558169"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/wireless/ath/ath12k/wmi.c"
},
"id": "CVE-2023-52829-40a64129",
"signature_version": "v1",
"signature_type": "Line"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b302dce3d9edea5b93d1902a541684a967f3c63c",
"digest": {
"function_hash": "41660808699520197773945711651374123764",
"length": 730.0
},
"target": {
"function": "ath12k_wmi_ext_hal_reg_caps",
"file": "drivers/net/wireless/ath/ath12k/wmi.c"
},
"id": "CVE-2023-52829-4fe00f1d",
"signature_version": "v1",
"signature_type": "Function"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4dd0547e8b45faf6f95373be5436b66cde326c0e",
"digest": {
"function_hash": "41660808699520197773945711651374123764",
"length": 730.0
},
"target": {
"function": "ath12k_wmi_ext_hal_reg_caps",
"file": "drivers/net/wireless/ath/ath12k/wmi.c"
},
"id": "CVE-2023-52829-9a6ab317",
"signature_version": "v1",
"signature_type": "Function"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b302dce3d9edea5b93d1902a541684a967f3c63c",
"digest": {
"line_hashes": [
"50277145134936533921689300327704154319",
"39918286408020834604216048217485398929",
"29607160164172624814113172613464258198",
"10429981067607311641693936976068558169"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/wireless/ath/ath12k/wmi.c"
},
"id": "CVE-2023-52829-a6e452ec",
"signature_version": "v1",
"signature_type": "Line"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dfe13eaab043130f90dd3d57c7d88577c04adc97",
"digest": {
"function_hash": "41660808699520197773945711651374123764",
"length": 730.0
},
"target": {
"function": "ath12k_wmi_ext_hal_reg_caps",
"file": "drivers/net/wireless/ath/ath12k/wmi.c"
},
"id": "CVE-2023-52829-bc6e08af",
"signature_version": "v1",
"signature_type": "Function"
}
]