Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52827
HistoryMay 21, 2024 - 12:00 a.m.

CVE-2023-52827

2024-05-2100:00:00
ubuntu.com
ubuntu.com
5
linux kernel
wifi
vulnerability
cve-2023-52827
validation
out-of-bound read
code review
compile test
unix

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: wifi:
ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats() len
is extracted from HTT message and could be an unexpected value in case
errors happen, so add validation before using to avoid possible
out-of-bound read in the following message iteration and parsing. The same
issue also applies to ppdu_info->ppdu_stats.common.num_users, so validate
it before using too. These are found during code review. Compile test only.

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

0.0004 Low

EPSS

Percentile

5.1%