๐Ÿ” CVE Alert

CVE-2024-47721

UNKNOWN 0.0

wifi: rtw89: remove unused C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM to prevent out-of-bounds reading

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: remove unused C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM to prevent out-of-bounds reading The handler of firmware C2H event RTW89_MAC_C2H_FUNC_READ_WOW_CAM isn't implemented, but driver expects number of handlers is NUM_OF_RTW89_MAC_C2H_FUNC_WOW causing out-of-bounds access. Fix it by removing ID. Addresses-Coverity-ID: 1598775 ("Out-of-bounds read")

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ff53fce5c78ba27ec7eb0baff7ef9648fde7ad8e < 10463308b9454f534d03300cf679bc4b3d078f46 ff53fce5c78ba27ec7eb0baff7ef9648fde7ad8e < 2c9c2d1a20916589497a7facbea3e82cabec4ab8 ff53fce5c78ba27ec7eb0baff7ef9648fde7ad8e < 56310ddb50b190b3390fdc974aec455d0a516bd2
Linux / Linux
6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/10463308b9454f534d03300cf679bc4b3d078f46 git.kernel.org: https://git.kernel.org/stable/c/2c9c2d1a20916589497a7facbea3e82cabec4ab8 git.kernel.org: https://git.kernel.org/stable/c/56310ddb50b190b3390fdc974aec455d0a516bd2