vulnerability
Debian: CVE-2023-52768: linux -- security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:L/Au:M/C:P/I:P/A:C) | 05/21/2024 | 07/30/2024 | 02/18/2025 |
Severity
6
CVSS
(AV:L/AC:L/Au:M/C:P/I:P/A:C)
Published
05/21/2024
Added
07/30/2024
Modified
02/18/2025
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: use vmm_table as array in wilc struct
Enabling KASAN and running some iperf tests raises some memory issues with
vmm_table:
BUG: KASAN: slab-out-of-bounds in wilc_wlan_handle_txq+0x6ac/0xdb4
Write of size 4 at addr c3a61540 by task wlan0-tx/95
KASAN detects that we are writing data beyond range allocated to vmm_table.
There is indeed a mismatch between the size passed to allocator in
wilc_wlan_init, and the range of possible indexes used later: allocation
size is missing a multiplication by sizeof(u32)
Solution
debian-upgrade-linux

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.