Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix qmi_msg_handler data structure initialization qmi_msg_handler is required to be null terminated by QMI module. There might be a case where a handler for a msg id is not present in the handlers array which can lead to infinite loop while searching the handler and therefore out of bound access in qmi_invoke_handler(). Hence update the initialization in qmi_msg_handler data structure. Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01100-QCAHKSWPL_SILICONZ-1
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d5d71de448f36e34592f7c81b5e300d3e8dbb735
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a10e1530c424bb277b4edc7def0195857a548495
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ed3725e15a154ebebf44e0c34806c57525483f92
6.0.16 (semver)
6.1.2 (semver)
6.2 (original_commit_for_fix)
References
git.kernel.org/...c/d5d71de448f36e34592f7c81b5e300d3e8dbb735
git.kernel.org/...c/a10e1530c424bb277b4edc7def0195857a548495
git.kernel.org/...c/ed3725e15a154ebebf44e0c34806c57525483f92
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.