In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: Avoid address calculations via out of bounds array indexing
Before request->channels[] can be used, request->n_channels must be set. Additionally, address calculations for memory after the "channels" array need to be calculated from the allocation base ("request") rather than via the first "out of bounds" index of "channels", otherwise run-time bounds checking will throw a warning.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 4914.0,
"function_hash": "321328638207538156827798088405051154440"
},
"target": {
"file": "net/wireless/nl80211.c",
"function": "nl80211_trigger_scan"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e2a5566462b53db7d4c4722da86eedf0b8f546c",
"signature_version": "v1",
"id": "CVE-2024-38562-02cd6980"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"168774249465201286077558398189477646583",
"169783401421877794219230922829146840252",
"47072911895828259536049080118356462593",
"85777803499528223936202362972493499725",
"234653970890847993728949354348244062468",
"172287632030059809927162318819713645631",
"71891978447535811344764431116114122683",
"20555236528974652222809779485082158796",
"271211849569557336219879045692614948374",
"196515167547856681406543898428003146992",
"203522768086333448894252144716616853613",
"79532613464366981991676264671842980559",
"36797614453169921115024642311904522314",
"163097136807642018080559631550245504671",
"136943674601402782687656570926340003762",
"37392181462855533280214888343105681477",
"5234447672026121981927578624193207098",
"18891045947667238150392990786577852427",
"1007262473246978896500199756102661886",
"31925832473622963952228240039027972629",
"6682188674198888548636118522195453913",
"154260683290207279201430739802113474473"
],
"threshold": 0.9
},
"target": {
"file": "net/wireless/nl80211.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e2a5566462b53db7d4c4722da86eedf0b8f546c",
"signature_version": "v1",
"id": "CVE-2024-38562-3f844a00"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 4913.0,
"function_hash": "41578766587994186300592589998153224867"
},
"target": {
"file": "net/wireless/nl80211.c",
"function": "nl80211_trigger_scan"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ed74398642fcb19f6ff385c35a7d512c6663e17b",
"signature_version": "v1",
"id": "CVE-2024-38562-55a61d1a"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"168774249465201286077558398189477646583",
"169783401421877794219230922829146840252",
"47072911895828259536049080118356462593",
"85777803499528223936202362972493499725",
"234653970890847993728949354348244062468",
"172287632030059809927162318819713645631",
"71891978447535811344764431116114122683",
"20555236528974652222809779485082158796",
"271211849569557336219879045692614948374",
"196515167547856681406543898428003146992",
"203522768086333448894252144716616853613",
"79532613464366981991676264671842980559",
"36797614453169921115024642311904522314",
"163097136807642018080559631550245504671",
"136943674601402782687656570926340003762",
"37392181462855533280214888343105681477",
"5234447672026121981927578624193207098",
"18891045947667238150392990786577852427",
"1007262473246978896500199756102661886",
"31925832473622963952228240039027972629",
"6682188674198888548636118522195453913",
"154260683290207279201430739802113474473"
],
"threshold": 0.9
},
"target": {
"file": "net/wireless/nl80211.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ed74398642fcb19f6ff385c35a7d512c6663e17b",
"signature_version": "v1",
"id": "CVE-2024-38562-58fa01ef"
}
]