Логотип exploitDog
bind:CVE-2024-58015
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-58015

Количество 9

Количество 9

ubuntu логотип

CVE-2024-58015

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2024-58015

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2024-58015

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758

CVSS3: 7.1
EPSS: Низкий
msrc логотип

CVE-2024-58015

3 месяца назад

wifi: ath12k: Fix for out-of bound access error

EPSS: Низкий
debian логотип

CVE-2024-58015

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-wgxf-r68r-7w9h

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02333-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02307-1

4 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02254-1

5 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-58015

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758

CVSS3: 7.1
0%
Низкий
9 месяцев назад
redhat логотип
CVE-2024-58015

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758

CVSS3: 6
0%
Низкий
9 месяцев назад
nvd логотип
CVE-2024-58015

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758

CVSS3: 7.1
0%
Низкий
9 месяцев назад
msrc логотип
CVE-2024-58015

wifi: ath12k: Fix for out-of bound access error

0%
Низкий
3 месяца назад
debian логотип
CVE-2024-58015

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 7.1
0%
Низкий
9 месяцев назад
github логотип
GHSA-wgxf-r68r-7w9h

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too big, resulting in possible out-of bound memory error. Decreasing buffer size by one fixes faulty upper bound of passed array. Discovered in coverity scan, CID 1600742 and CID 1600758

CVSS3: 7.1
0%
Низкий
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02333-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02307-1

Security update for the Linux Kernel

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02254-1

Security update for the Linux Kernel

5 месяцев назад

Уязвимостей на страницу