In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: use vmm_table as array in wilc struct
Enabling KASAN and running some iperf tests raises some memory issues with
vmm_table:
BUG: KASAN: slab-out-of-bounds in wilc_wlan_handle_txq+0x6ac/0xdb4
Write of size 4 at addr c3a61540 by task wlan0-tx/95
KASAN detects that we are writing data beyond range allocated to vmm_table.
There is indeed a mismatch between the size passed to allocator in
wilc_wlan_init, and the range of possible indexes used later: allocation
size is missing a multiplication by sizeof(u32)
References
Configurations
Configuration 1 (hide)
|
History
02 Apr 2025, 15:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-129 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/05ac1a198a63ad66bf5ae8b7321407c102d40ef3 - Patch | |
References | () https://git.kernel.org/stable/c/3ce1c2c3999b232258f7aabab311d47dda75605c - Patch | |
References | () https://git.kernel.org/stable/c/4b0d6ddb6466d10df878a7787f175a0e4adc3e27 - Patch | |
References | () https://git.kernel.org/stable/c/541b3757fd443a68ed8d25968eae511a8275e7c8 - Patch | |
References | () https://git.kernel.org/stable/c/6aaf7cd8bdfe245d3c9a8b48fe70c2011965948e - Patch |
Information
Published : 2024-05-21 16:15
Updated : 2025-04-02 15:03
NVD link : CVE-2023-52768
Mitre link : CVE-2023-52768
CVE.ORG link : CVE-2023-52768
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index