CVE-2024-38562
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/06/2024
Last modified:
30/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: nl80211: Avoid address calculations via out of bounds array indexing<br />
<br />
Before request->channels[] can be used, request->n_channels must be set.<br />
Additionally, address calculations for memory after the "channels" array<br />
need to be calculated from the allocation base ("request") rather than<br />
via the first "out of bounds" index of "channels", otherwise run-time<br />
bounds checking will throw a warning.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.9.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



