CVE-2023-52531

Source
https://cve.org/CVERecord?id=CVE-2023-52531
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52531.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52531
Downstream
Related
Published
2024-03-02T21:52:35.664Z
Modified
2026-03-20T12:32:36.134594Z
Summary
wifi: iwlwifi: mvm: Fix a memory corruption issue
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: Fix a memory corruption issue

A few lines above, space is kzalloc()'ed for: sizeof(struct iwlnvmdata) + sizeof(struct ieee80211channel) + sizeof(struct ieee80211rate)

'mvm->nvmdata' is a 'struct iwlnvm_data', so it is fine.

At the end of this structure, there is the 'channels' flex array. Each element is of type 'struct ieee80211_channel'. So only 1 element is allocated in this array.

When doing: mvm->nvmdata->bands[0].channels = mvm->nvmdata->channels; We point at the first element of the 'channels' flex array. So this is fine.

However, when doing: mvm->nvmdata->bands[0].bitrates = (void *)((u8 *)mvm->nvmdata->channels + 1); because of the "(u8 *)" cast, we add only 1 to the address of the beginning of the flex array.

It is likely that we want point at the 'struct ieee80211_rate' allocated just after.

Remove the spurious casting so that the pointer arithmetic works as expected.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52531.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8ca151b568b67a7b72dcfc6ee6ea7c107ddd795c
Fixed
7c8faa31080342aec4903c9acb20caf82fcca1ef
Fixed
6b3223449c959a8be94a1f042288059e40fcccb0
Fixed
f06cdd8d4ba5252986f51f80cc30263636397128
Fixed
8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52531.json"