CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
JIRA: https://issues.redhat.com/browse/RHEL-103158
CVE: CVE-2025-38159
commit 4c2c372de2e108319236203cce6de44d70ae15cd
Author: Alexey Kodanev <aleksei.kodanev@bell-sw.com>
Date: Tue May 13 12:13:04 2025 +0000
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
Set the size to 6 instead of 2, since 'para' array is passed to
'rtw_fw_bt_wifi_control(rtwdev, para[0], ¶[1])', which reads
5 bytes:
void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data)
{
...
SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data);
SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1));
...
SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4));
Detected using the static analysis tool - Svace.
Fixes: 4136214f7c46 ("rtw88: add BT co-existence support")
Signed-off-by: Alexey Kodanev <aleksei.kodanev@bell-sw.com>
Signed-off-by: Ping-Ke Shih <pkshih@realtek.com>
Link: https://patch.msgid.link/20250513121304.124141-1-aleksei.kodanev@bell-sw.com
Signed-off-by: CKI Backport Bot cki-ci-bot+cki-gitlab-backport-bot@redhat.com
Created 2025-07-12 14:52 UTC by backporter - KWF FAQ - Slack #team-kernel-workflow - Source - Documentation - Report an issue