Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-52594

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-06 Mar, 2024 | 06:45
Updated At-21 May, 2025 | 08:49
Rejected At-
Credits

wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() Fix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug occurs when txs->cnt, data from a URB provided by a USB device, is bigger than the size of the array txs->txstatus, which is HTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug handling code after the check. Make the function return if that is the case. Found by a modified version of syzkaller. UBSAN: array-index-out-of-bounds in htc_drv_txrx.c index 13 is out of range for type '__wmi_event_txstatus [12]' Call Trace: ath9k_htc_txstatus ath9k_wmi_event_tasklet tasklet_action_common __do_softirq irq_exit_rxu sysvec_apic_timer_interrupt

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:06 Mar, 2024 | 06:45
Updated At:21 May, 2025 | 08:49
Rejected At:
▼CVE Numbering Authority (CNA)
wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() Fix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug occurs when txs->cnt, data from a URB provided by a USB device, is bigger than the size of the array txs->txstatus, which is HTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug handling code after the check. Make the function return if that is the case. Found by a modified version of syzkaller. UBSAN: array-index-out-of-bounds in htc_drv_txrx.c index 13 is out of range for type '__wmi_event_txstatus [12]' Call Trace: ath9k_htc_txstatus ath9k_wmi_event_tasklet tasklet_action_common __do_softirq irq_exit_rxu sysvec_apic_timer_interrupt

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/ath/ath9k/htc_drv_txrx.c
Default Status
unaffected
Versions
Affected
  • From 27876a29de221186c9d5883e5fe5f6da18ef9a45 before f44f073c78112ff921a220d01b86d09f2ace59bc (git)
  • From 27876a29de221186c9d5883e5fe5f6da18ef9a45 before f11f0fd1ad6c11ae7856d4325fe9d05059767225 (git)
  • From 27876a29de221186c9d5883e5fe5f6da18ef9a45 before 84770a996ad8d7f121ff2fb5a8d149aad52d64c1 (git)
  • From 27876a29de221186c9d5883e5fe5f6da18ef9a45 before 9003fa9a0198ce004b30738766c67eb7373479c9 (git)
  • From 27876a29de221186c9d5883e5fe5f6da18ef9a45 before 25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234 (git)
  • From 27876a29de221186c9d5883e5fe5f6da18ef9a45 before e4f4bac7d3b64eb75f70cd3345712de6f68a215d (git)
  • From 27876a29de221186c9d5883e5fe5f6da18ef9a45 before be609c7002dd4504b15b069cb7582f4c778548d1 (git)
  • From 27876a29de221186c9d5883e5fe5f6da18ef9a45 before 2adc886244dff60f948497b59affb6c6ebb3c348 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/ath/ath9k/htc_drv_txrx.c
Default Status
affected
Versions
Affected
  • 3.0
Unaffected
  • From 0 before 3.0 (semver)
  • From 4.19.307 through 4.19.* (semver)
  • From 5.4.269 through 5.4.* (semver)
  • From 5.10.210 through 5.10.* (semver)
  • From 5.15.149 through 5.15.* (semver)
  • From 6.1.77 through 6.1.* (semver)
  • From 6.6.16 through 6.6.* (semver)
  • From 6.7.4 through 6.7.* (semver)
  • From 6.8 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc
N/A
https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225
N/A
https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1
N/A
https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9
N/A
https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234
N/A
https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d
N/A
https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1
N/A
https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348
N/A
Hyperlink: https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc
x_transferred
https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225
x_transferred
https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1
x_transferred
https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9
x_transferred
https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234
x_transferred
https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d
x_transferred
https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1
x_transferred
https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
x_transferred
Hyperlink: https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:06 Mar, 2024 | 07:15
Updated At:12 Dec, 2024 | 15:10

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() Fix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug occurs when txs->cnt, data from a URB provided by a USB device, is bigger than the size of the array txs->txstatus, which is HTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug handling code after the check. Make the function return if that is the case. Found by a modified version of syzkaller. UBSAN: array-index-out-of-bounds in htc_drv_txrx.c index 13 is out of range for type '__wmi_event_txstatus [12]' Call Trace: ath9k_htc_txstatus ath9k_wmi_event_tasklet tasklet_action_common __do_softirq irq_exit_rxu sysvec_apic_timer_interrupt

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions before 4.19.307(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.269(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.210(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.149(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.77(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.16(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.7.4(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-129Primarynvd@nist.gov
CWE ID: CWE-129
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215daf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bcaf854a3a-2127-422b-91ae-364da2661108
Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Hyperlink: https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found