In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: remove unused C2H event ID RTW89MACC2HFUNCREADWOWCAM to prevent out-of-bounds reading
The handler of firmware C2H event RTW89MACC2HFUNCREADWOWCAM isn't implemented, but driver expects number of handlers is NUMOFRTW89MACC2HFUNCWOW causing out-of-bounds access. Fix it by removing ID.
Addresses-Coverity-ID: 1598775 ("Out-of-bounds read")
[ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@56310ddb50b190b3390fdc974aec455d0a516bd2", "signature_version": "v1", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac.h" }, "digest": { "threshold": 0.9, "line_hashes": [ "94220961291039283782008954176350451409", "152014218331250749279535668299154066548", "37373956371464278799937450566996738653", "28379508172480865207537290211201303462" ] }, "deprecated": false, "signature_type": "Line", "id": "CVE-2024-47721-293eb8e1" } ]