Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52832
HistoryMay 21, 2024 - 12:00 a.m.

CVE-2023-52832

2024-05-2100:00:00
ubuntu.com
ubuntu.com
5
linux kernel
mac80211
vulnerability
ieee80211_get_tx_power
ubsan
nl80211
cfg80211
ieee80211_if_add
ieee80211_register_hw

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.2%

In the Linux kernel, the following vulnerability has been resolved: wifi:
mac80211: don’t return unset power in ieee80211_get_tx_power() We can get a
UBSAN warning if ieee80211_get_tx_power() returns the INT_MIN value
mac80211 internally uses for “unset power level”. UBSAN:
signed-integer-overflow in net/wireless/nl80211.c:3816:5 -2147483648 * 100
cannot be represented in type ‘int’ CPU: 0 PID: 20433 Comm: insmod Tainted:
G WC OE Call Trace: dump_stack+0x74/0x92 ubsan_epilogue+0x9/0x50
handle_overflow+0x8d/0xd0 __ubsan_handle_mul_overflow+0xe/0x10
nl80211_send_iface+0x688/0x6b0 [cfg80211] […]
cfg80211_register_wdev+0x78/0xb0 [cfg80211]
cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211] […]
ieee80211_if_add+0x60e/0x8f0 [mac80211] ieee80211_register_hw+0xda5/0x1170
[mac80211] In this case, simply return an error instead, to indicate that
no data is available.

References

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.2%