๐Ÿ” CVE Alert

CVE-2024-49931

UNKNOWN 0.0

wifi: ath12k: fix array out-of-bound access in SoC stats

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix array out-of-bound access in SoC stats Currently, the ath12k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath12k_dp_rx_process() function access ath12k_soc_dp_stats::hal_reo_error using the REO destination SRNG ring ID, which is incorrect. SRNG ring ID differ from normal ring ID, and this usage leads to out-of-bounds array access. To fix this issue, modify ath12k_dp_rx_process() to use the normal ring ID directly instead of the SRNG ring ID to avoid out-of-bounds array access. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d889913205cf7ebda905b1e62c5867ed4e39f6c2 < d0e4274d9dc9f8409d56d622cd3ecf7b6fd49e2f d889913205cf7ebda905b1e62c5867ed4e39f6c2 < a4aef827a41cdaf6201bbaf773c1eae4e20e967b d889913205cf7ebda905b1e62c5867ed4e39f6c2 < ad791e3ec60cb66c1e4dc121ffbf872df312427d d889913205cf7ebda905b1e62c5867ed4e39f6c2 < e106b7ad13c1d246adaa57df73edb8f8b8acb240
Linux / Linux
6.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d0e4274d9dc9f8409d56d622cd3ecf7b6fd49e2f git.kernel.org: https://git.kernel.org/stable/c/a4aef827a41cdaf6201bbaf773c1eae4e20e967b git.kernel.org: https://git.kernel.org/stable/c/ad791e3ec60cb66c1e4dc121ffbf872df312427d git.kernel.org: https://git.kernel.org/stable/c/e106b7ad13c1d246adaa57df73edb8f8b8acb240