CVE-2024-46827
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/09/2024
Last modified:
20/11/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: ath12k: fix firmware crash due to invalid peer nss<br />
<br />
Currently, if the access point receives an association<br />
request containing an Extended HE Capabilities Information<br />
Element with an invalid MCS-NSS, it triggers a firmware<br />
crash.<br />
<br />
This issue arises when EHT-PHY capabilities shows support<br />
for a bandwidth and MCS-NSS set for that particular<br />
bandwidth is filled by zeros and due to this, driver obtains<br />
peer_nss as 0 and sending this value to firmware causes<br />
crash.<br />
<br />
Address this issue by implementing a validation step for<br />
the peer_nss value before passing it to the firmware. If<br />
the value is greater than zero, proceed with forwarding<br />
it to the firmware. However, if the value is invalid,<br />
reject the association request to prevent potential<br />
firmware crashes.<br />
<br />
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.51 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10 (including) | 6.10.10 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



