CVE-2023-52768

Source
https://cve.org/CVERecord?id=CVE-2023-52768
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52768.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52768
Downstream
Related
Published
2024-05-21T15:30:51.656Z
Modified
2026-04-11T12:46:36.110565Z
Severity
  • 5.6 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H CVSS Calculator
Summary
wifi: wilc1000: use vmm_table as array in wilc struct
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: use vmm_table as array in wilc struct

Enabling KASAN and running some iperf tests raises some memory issues with vmm_table:

BUG: KASAN: slab-out-of-bounds in wilcwlanhandle_txq+0x6ac/0xdb4 Write of size 4 at addr c3a61540 by task wlan0-tx/95

KASAN detects that we are writing data beyond range allocated to vmmtable. There is indeed a mismatch between the size passed to allocator in wilcwlan_init, and the range of possible indexes used later: allocation size is missing a multiplication by sizeof(u32)

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52768.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
32dd0b22a5ba1dd296ccf2caf46ad44c3a8d5d98
Fixed
541b3757fd443a68ed8d25968eae511a8275e7c8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
40b717bfcefab28a0656b8caa5e43d5449e5a671
Fixed
4b0d6ddb6466d10df878a7787f175a0e4adc3e27
Fixed
6aaf7cd8bdfe245d3c9a8b48fe70c2011965948e
Fixed
3ce1c2c3999b232258f7aabab311d47dda75605c
Fixed
05ac1a198a63ad66bf5ae8b7321407c102d40ef3
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
5212d958f6518003cd98c9886f8e8aedcfc25741

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52768.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.140
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.64
Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.5.13
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52768.json"