In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: avoid reading out of bounds when loading TX power FW elements
Because the loop-expression will do one more time before getting false from cond-expression, the original code copied one more entry size beyond valid region.
Fix it by moving the entry copy to loop-body.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49928.json"
}[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-49928-9d6bf5ef",
"target": {
"file": "drivers/net/wireless/realtek/rtw89/core.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"332520451578433697052298936636789521171",
"188499148134605168909398059293315431860",
"262934213946536811202850214314958962131",
"215584702105389381632302852556487655316",
"35331400171109415642335077869580495581",
"312835072370300208589961861427070305701",
"21170558733915924505477167606488416152",
"329033334020700073131614659072301714800",
"245121918579715477356846467463388228878",
"87994208429222387658321796998744826897"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@83c84cdb75572048b67d6a3916283aeac865996e"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49928.json"