{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-52531","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-20T12:30:33.319Z","datePublished":"2024-03-02T21:52:35.664Z","dateUpdated":"2025-05-04T07:38:42.739Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:38:42.739Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix a memory corruption issue\n\nA few lines above, space is kzalloc()'ed for:\n\tsizeof(struct iwl_nvm_data) +\n\tsizeof(struct ieee80211_channel) +\n\tsizeof(struct ieee80211_rate)\n\n'mvm->nvm_data' is a 'struct iwl_nvm_data', so it is fine.\n\nAt the end of this structure, there is the 'channels' flex array.\nEach element is of type 'struct ieee80211_channel'.\nSo only 1 element is allocated in this array.\n\nWhen doing:\n  mvm->nvm_data->bands[0].channels = mvm->nvm_data->channels;\nWe point at the first element of the 'channels' flex array.\nSo this is fine.\n\nHowever, when doing:\n  mvm->nvm_data->bands[0].bitrates =\n\t\t\t(void *)((u8 *)mvm->nvm_data->channels + 1);\nbecause of the \"(u8 *)\" cast, we add only 1 to the address of the beginning\nof the flex array.\n\nIt is likely that we want point at the 'struct ieee80211_rate' allocated\njust after.\n\nRemove the spurious casting so that the pointer arithmetic works as\nexpected."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/wireless/intel/iwlwifi/mvm/fw.c"],"versions":[{"version":"8ca151b568b67a7b72dcfc6ee6ea7c107ddd795c","lessThan":"7c8faa31080342aec4903c9acb20caf82fcca1ef","status":"affected","versionType":"git"},{"version":"8ca151b568b67a7b72dcfc6ee6ea7c107ddd795c","lessThan":"6b3223449c959a8be94a1f042288059e40fcccb0","status":"affected","versionType":"git"},{"version":"8ca151b568b67a7b72dcfc6ee6ea7c107ddd795c","lessThan":"f06cdd8d4ba5252986f51f80cc30263636397128","status":"affected","versionType":"git"},{"version":"8ca151b568b67a7b72dcfc6ee6ea7c107ddd795c","lessThan":"8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/wireless/intel/iwlwifi/mvm/fw.c"],"versions":[{"version":"3.9","status":"affected"},{"version":"0","lessThan":"3.9","status":"unaffected","versionType":"semver"},{"version":"5.15.135","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.57","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.5.7","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.9","versionEndExcluding":"5.15.135"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.9","versionEndExcluding":"6.1.57"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.9","versionEndExcluding":"6.5.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.9","versionEndExcluding":"6.6"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/7c8faa31080342aec4903c9acb20caf82fcca1ef"},{"url":"https://git.kernel.org/stable/c/6b3223449c959a8be94a1f042288059e40fcccb0"},{"url":"https://git.kernel.org/stable/c/f06cdd8d4ba5252986f51f80cc30263636397128"},{"url":"https://git.kernel.org/stable/c/8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d"}],"title":"wifi: iwlwifi: mvm: Fix a memory corruption issue","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52531","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-03-04T19:38:20.613089Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:23:46.452Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:03:20.656Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/7c8faa31080342aec4903c9acb20caf82fcca1ef","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6b3223449c959a8be94a1f042288059e40fcccb0","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/f06cdd8d4ba5252986f51f80cc30263636397128","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d","tags":["x_transferred"]}]}]}}