29 lines
1.7 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-58015",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-27T03:15:12.493",
"lastModified": "2025-02-27T03:15:12.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Fix for out-of bound access error\n\nSelfgen stats are placed in a buffer using print_array_to_buf_index() function.\nArray length parameter passed to the function is too big, resulting in possible\nout-of bound memory error.\nDecreasing buffer size by one fixes faulty upper bound of passed array.\n\nDiscovered in coverity scan, CID 1600742 and CID 1600758"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: Correcci\u00f3n del error de acceso fuera de los l\u00edmites Las estad\u00edsticas de autogeneraci\u00f3n se colocan en un b\u00fafer mediante la funci\u00f3n print_array_to_buf_index(). El par\u00e1metro de longitud de matriz que se pasa a la funci\u00f3n es demasiado grande, lo que da como resultado un posible error de memoria fuera de los l\u00edmites. La reducci\u00f3n del tama\u00f1o del b\u00fafer en uno corrige el l\u00edmite superior defectuoso de la matriz pasada. Descubierto en el an\u00e1lisis de cobertura, CID 1600742 y CID 1600758"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/8700c4bf8b7ed98037d2acf1eaf770ad6dd431d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/eb8c0534713865d190856f10bfc97cf0b88475b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}