Количество 13
Количество 13
CVE-2024-58015
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758
CVE-2024-58015
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758
CVE-2024-58015
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758
CVE-2024-58015
wifi: ath12k: Fix for out-of bound access error
CVE-2024-58015
In the Linux kernel, the following vulnerability has been resolved: w ...
GHSA-wgxf-r68r-7w9h
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758
ELSA-2025-20095-0
ELSA-2025-20095-0: kernel security update (MODERATE)
RLSA-2025:20095
Moderate: kernel security update
ELSA-2025-20518-0
ELSA-2025-20518-0: kernel security update (MODERATE)
RLSA-2025:20518
Moderate: kernel security update
SUSE-SU-2025:02333-1
Security update for the Linux Kernel
SUSE-SU-2025:02307-1
Security update for the Linux Kernel
SUSE-SU-2025:02254-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-58015 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758 | CVSS3: 7.1 | 0% Низкий | 11 месяцев назад | |
CVE-2024-58015 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758 | CVSS3: 6 | 0% Низкий | 11 месяцев назад | |
CVE-2024-58015 In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758 | CVSS3: 7.1 | 0% Низкий | 11 месяцев назад | |
CVE-2024-58015 wifi: ath12k: Fix for out-of bound access error | 0% Низкий | 5 месяцев назад | ||
CVE-2024-58015 In the Linux kernel, the following vulnerability has been resolved: w ... | CVSS3: 7.1 | 0% Низкий | 11 месяцев назад | |
GHSA-wgxf-r68r-7w9h In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758 | CVSS3: 7.1 | 0% Низкий | 11 месяцев назад | |
ELSA-2025-20095-0 ELSA-2025-20095-0: kernel security update (MODERATE) | 2 месяца назад | |||
RLSA-2025:20095 Moderate: kernel security update | 2 месяца назад | |||
ELSA-2025-20518-0 ELSA-2025-20518-0: kernel security update (MODERATE) | 3 месяца назад | |||
RLSA-2025:20518 Moderate: kernel security update | 3 месяца назад | |||
SUSE-SU-2025:02333-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:02307-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:02254-1 Security update for the Linux Kernel | 7 месяцев назад |
Уязвимостей на страницу