CVE-2024-49930

Source
https://cve.org/CVERecord?id=CVE-2024-49930
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49930.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-49930
Downstream
Related
Published
2024-10-21T18:01:53.126Z
Modified
2026-03-11T07:46:20.892601Z
Summary
wifi: ath11k: fix array out-of-bound access in SoC stats
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix array out-of-bound access in SoC stats

Currently, the ath11ksocdpstats::halreoerror array is defined with a maximum size of DPREODSTRINGMAX. However, the ath11kdpprocessrx() function access ath11ksocdpstats::halreoerror using the REO destination SRNG ring ID, which is incorrect. SRNG ring ID differ from normal ring ID, and this usage leads to out-of-bounds array access. To fix this issue, modify ath11kdpprocessrx() to use the normal ring ID directly instead of the SRNG ring ID to avoid out-of-bounds array access.

Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49930.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d5c65159f2895379e11ca13f62feabe93278985d
Fixed
0f26f26944035ec67546a944f182cbad6577a9c0
Fixed
4dd732893bd38cec51f887244314e2b47f0d658f
Fixed
73e235728e515faccc104b0153b47d0f263b3344
Fixed
7a552bc2f3efe2aaf77a85cb34cdf4a63d81a1a7
Fixed
6045ef5b4b00fee3629689f791992900a1c94009
Fixed
01b77f5ee11c89754fb836af8f76799d3b72ae2f
Fixed
69f253e46af98af17e3efa3e5dfa72fcb7d1983d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49930.json"