In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: avoid referencing uninit memory in ath9kwmictrl_rx
For the reasons also described in commit b383e8abed41 ("wifi: ath9k: avoid uninit memory read in ath9khtcrxmsg()"), ath9khtcrxmsg() should validate pkt_len before accessing the SKB.
For example, the obtained SKB may have been badly constructed with pktlen = 8. In this case, the SKB can only contain a valid htcframehdr but after being processed in ath9khtcrxmsg() and passed to ath9kwmictrl_rx() endpoint RX handler, it is expected to have a WMI command header which should be located inside its data payload.
Implement sanity checking inside ath9kwmictrl_rx(). Otherwise, uninit memory can be referenced.
Tested on Qualcomm Atheros Communications AR9271 802.11n .
Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54300.json",
"cna_assigner": "Linux"
}