CVE-2024-38572
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
19/06/2024
Last modified:
17/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: ath12k: fix out-of-bound access of qmi_invoke_handler()<br />
<br />
Currently, there is no terminator entry for ath12k_qmi_msg_handlers hence<br />
facing below KASAN warning,<br />
<br />
==================================================================<br />
BUG: KASAN: global-out-of-bounds in qmi_invoke_handler+0xa4/0x148<br />
Read of size 8 at addr ffffffd00a6428d8 by task kworker/u8:2/1273<br />
<br />
CPU: 0 PID: 1273 Comm: kworker/u8:2 Not tainted 5.4.213 #0<br />
Workqueue: qmi_msg_handler qmi_data_ready_work<br />
Call trace:<br />
dump_backtrace+0x0/0x20c<br />
show_stack+0x14/0x1c<br />
dump_stack+0xe0/0x138<br />
print_address_description.isra.5+0x30/0x330<br />
__kasan_report+0x16c/0x1bc<br />
kasan_report+0xc/0x14<br />
__asan_load8+0xa8/0xb0<br />
qmi_invoke_handler+0xa4/0x148<br />
qmi_handle_message+0x18c/0x1bc<br />
qmi_data_ready_work+0x4ec/0x528<br />
process_one_work+0x2c0/0x440<br />
worker_thread+0x324/0x4b8<br />
kthread+0x210/0x228<br />
ret_from_fork+0x10/0x18<br />
<br />
The address belongs to the variable:<br />
ath12k_mac_mon_status_filter_default+0x4bd8/0xfffffffffffe2300 [ath12k]<br />
[...]<br />
==================================================================<br />
<br />
Add a dummy terminator entry at the end to assist the qmi_invoke_handler()<br />
in traversing up to the terminator entry without accessing an<br />
out-of-boundary index.<br />
<br />
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.9.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/95575de7dede7b1ed3b9718dab9dda97914ea775
- https://git.kernel.org/stable/c/a1abdb63628b04855a929850772de97435ed1555
- https://git.kernel.org/stable/c/b48d40f5840c505b7af700594aa8379eec28e925
- https://git.kernel.org/stable/c/e1bdff48a1bb4a4ac660c19c55a820968c48b3f2
- https://git.kernel.org/stable/c/95575de7dede7b1ed3b9718dab9dda97914ea775
- https://git.kernel.org/stable/c/a1abdb63628b04855a929850772de97435ed1555
- https://git.kernel.org/stable/c/b48d40f5840c505b7af700594aa8379eec28e925
- https://git.kernel.org/stable/c/e1bdff48a1bb4a4ac660c19c55a820968c48b3f2



