In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: fix null pointer access when abort scan
During cancel scan we might use vif that weren't scanning. Fix this by using the actual scanning vif.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac80211.c", "function": "rtw89_ops_bss_info_changed" }, "deprecated": false, "digest": { "length": 1112.0, "function_hash": "185829117806904944081635480304548475543" }, "id": "CVE-2024-35946-422ecee3", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e11a2966f51695c0af0b1f976a32d64dee243b2" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac80211.c" }, "deprecated": false, "digest": { "line_hashes": [ "329069997578465616691988169888169637180", "310462509626585577616721440387949320656", "324101909435768706080751913914375009350", "229799924794006228821233676870626489311", "219168237159055833769681214734285836564", "131967516710754115117032556091500520414", "177152134971258170768053411838759070542", "54670218353860761247314715322935961411" ], "threshold": 0.9 }, "id": "CVE-2024-35946-431d71b1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4f11c741908dab7dd48fa5a986b210d4fc74ca8d" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac80211.c", "function": "rtw89_ops_remain_on_channel" }, "deprecated": false, "digest": { "length": 650.0, "function_hash": "58369027482175505794119098213885449687" }, "id": "CVE-2024-35946-4efb98f2", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b34d64e9aa5505e3c84570aed5c757f1839573e8" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac80211.c", "function": "rtw89_ops_remain_on_channel" }, "deprecated": false, "digest": { "length": 650.0, "function_hash": "58369027482175505794119098213885449687" }, "id": "CVE-2024-35946-77b714c1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4f11c741908dab7dd48fa5a986b210d4fc74ca8d" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac80211.c" }, "deprecated": false, "digest": { "line_hashes": [ "329069997578465616691988169888169637180", "310462509626585577616721440387949320656", "324101909435768706080751913914375009350", "229799924794006228821233676870626489311", "219168237159055833769681214734285836564", "131967516710754115117032556091500520414", "177152134971258170768053411838759070542", "54670218353860761247314715322935961411" ], "threshold": 0.9 }, "id": "CVE-2024-35946-7fbe05f2", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e11a2966f51695c0af0b1f976a32d64dee243b2" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac80211.c", "function": "rtw89_ops_remain_on_channel" }, "deprecated": false, "digest": { "length": 650.0, "function_hash": "58369027482175505794119098213885449687" }, "id": "CVE-2024-35946-99bf1392", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e11a2966f51695c0af0b1f976a32d64dee243b2" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac80211.c", "function": "rtw89_ops_bss_info_changed" }, "deprecated": false, "digest": { "length": 1112.0, "function_hash": "185829117806904944081635480304548475543" }, "id": "CVE-2024-35946-d1e45f91", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4f11c741908dab7dd48fa5a986b210d4fc74ca8d" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac80211.c" }, "deprecated": false, "digest": { "line_hashes": [ "329069997578465616691988169888169637180", "310462509626585577616721440387949320656", "324101909435768706080751913914375009350", "229799924794006228821233676870626489311", "219168237159055833769681214734285836564", "131967516710754115117032556091500520414", "177152134971258170768053411838759070542", "54670218353860761247314715322935961411" ], "threshold": 0.9 }, "id": "CVE-2024-35946-f306d454", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b34d64e9aa5505e3c84570aed5c757f1839573e8" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/net/wireless/realtek/rtw89/mac80211.c", "function": "rtw89_ops_bss_info_changed" }, "deprecated": false, "digest": { "length": 1112.0, "function_hash": "185829117806904944081635480304548475543" }, "id": "CVE-2024-35946-f82b2b4c", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b34d64e9aa5505e3c84570aed5c757f1839573e8" } ] }