CVE-2024-58014

Source
https://cve.org/CVERecord?id=CVE-2024-58014
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58014.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-58014
Downstream
Related
Published
2025-02-27T02:12:07.344Z
Modified
2026-03-12T02:15:06.524691Z
Summary
wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmsmac: add gain range check to wlcphyiqcalgainparamsnphy()

In 'wlcphyiqcalgainparamsnphy()', add gain range check to WARN() instead of possible out-of-bounds 'tbliqcalgainparams_nphy' access. Compile tested only.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/58xxx/CVE-2024-58014.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5b435de0d786869c95d1962121af0d7df2542009
Fixed
0a457223cb2b9ca46bae7de387d0f4c093b0220d
Fixed
13ef16c4fe384b1e70277bbe1d87934ee6c81e12
Fixed
d280a12e9b87819a8a209639d600b48a2d6d65dc
Fixed
ada9df08b3ef683507e75b92f522fb659260147f
Fixed
093286c33409bf38896f2dab0c0bb6ca388afb33
Fixed
c27ce584d274f6ad3cba2294497de824a3c66646
Fixed
6f6e293246dc1f5b2b6b3d0f2d757598489cda79
Fixed
3f4a0948c3524ae50f166dbc6572a3296b014e62

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58014.json"