CVE-2024-38572

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/06/2024
Last modified:
20/06/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath12k: fix out-of-bound access of qmi_invoke_handler()<br /> <br /> Currently, there is no terminator entry for ath12k_qmi_msg_handlers hence<br /> facing below KASAN warning,<br /> <br /> ==================================================================<br /> BUG: KASAN: global-out-of-bounds in qmi_invoke_handler+0xa4/0x148<br /> Read of size 8 at addr ffffffd00a6428d8 by task kworker/u8:2/1273<br /> <br /> CPU: 0 PID: 1273 Comm: kworker/u8:2 Not tainted 5.4.213 #0<br /> Workqueue: qmi_msg_handler qmi_data_ready_work<br /> Call trace:<br /> dump_backtrace+0x0/0x20c<br /> show_stack+0x14/0x1c<br /> dump_stack+0xe0/0x138<br /> print_address_description.isra.5+0x30/0x330<br /> __kasan_report+0x16c/0x1bc<br /> kasan_report+0xc/0x14<br /> __asan_load8+0xa8/0xb0<br /> qmi_invoke_handler+0xa4/0x148<br /> qmi_handle_message+0x18c/0x1bc<br /> qmi_data_ready_work+0x4ec/0x528<br /> process_one_work+0x2c0/0x440<br /> worker_thread+0x324/0x4b8<br /> kthread+0x210/0x228<br /> ret_from_fork+0x10/0x18<br /> <br /> The address belongs to the variable:<br /> ath12k_mac_mon_status_filter_default+0x4bd8/0xfffffffffffe2300 [ath12k]<br /> [...]<br /> ==================================================================<br /> <br /> Add a dummy terminator entry at the end to assist the qmi_invoke_handler()<br /> in traversing up to the terminator entry without accessing an<br /> out-of-boundary index.<br /> <br /> Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1

Impact