Lucene search

K
cveLinuxCVE-2024-38562
HistoryJun 19, 2024 - 2:15 p.m.

CVE-2024-38562

2024-06-1914:15:16
CWE-129
Linux
web.nvd.nist.gov
32
linux kernel
wifi vulnerability
out of bounds array indexing

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: Avoid address calculations via out of bounds array indexing

Before request->channels[] can be used, request->n_channels must be set.
Additionally, address calculations for memory after the “channels” array
need to be calculated from the allocation base (“request”) rather than
via the first “out of bounds” index of “channels”, otherwise run-time
bounds checking will throw a warning.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange6.66.6.33
OR
linuxlinux_kernelRange6.76.8.12
OR
linuxlinux_kernelRange6.96.9.3
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/wireless/nl80211.c"
    ],
    "versions": [
      {
        "version": "e3eac9f32ec0",
        "lessThan": "ed74398642fc",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "e3eac9f32ec0",
        "lessThan": "4e2a5566462b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "e3eac9f32ec0",
        "lessThan": "8fa4d56564ee",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "e3eac9f32ec0",
        "lessThan": "838c7b8f1f27",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/wireless/nl80211.c"
    ],
    "versions": [
      {
        "version": "6.6",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "6.6",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.33",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.8.12",
        "lessThanOrEqual": "6.8.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9.3",
        "lessThanOrEqual": "6.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0

Percentile

5.1%