
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, an array-index-out-of-bounds vulnerability was identified in the AHCI (Advanced Host Controller Interface) driver. The issue occurs because satapmpinitlinks() initializes link->pmp up to SATAPMPMAXPORTS while em_priv is declared as an 8-element array (NVD).
The vulnerability manifests as an array-index-out-of-bounds error in /build/linux-9H675w/linux-5.15.0/drivers/ata/libahci.c:968:41. The UBSAN (Undefined Behavior Sanitizer) reported that index 15 is out of range for type 'ahciempriv [8]'. The issue stems from a mismatch between SATAPMPMAXPORTS and the size of empriv array. According to the AHCI specification v1.3.1, the 'Port Multiplier Information' can utilize 4 bits, implying support for up to 16 ports (NVD).
The vulnerability could lead to memory corruption due to out-of-bounds array access, potentially affecting system stability and security. The issue specifically impacts the AHCI driver's handling of port multiplier configurations (NVD).
The vulnerability has been resolved by matching EMMAXSLOTS with SATAPMPMAX_PORTS in the AHCI driver. This fix ensures proper array bounds checking and prevents out-of-bounds access (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."