In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: validate HE operation element parsing
Validate that the HE operation element has the correct length before parsing it.
[
{
"id": "CVE-2024-40930-82c4e416",
"target": {
"file": "net/wireless/scan.c",
"function": "cfg80211_6ghz_power_type_valid"
},
"digest": {
"length": 688.0,
"function_hash": "96208251202872825605885784463214186435"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f15e3e13e14cc5ae8f950c16efe706add18ac8e2",
"signature_version": "v1"
},
{
"id": "CVE-2024-40930-a3aaa347",
"target": {
"file": "net/wireless/scan.c",
"function": "cfg80211_6ghz_power_type_valid"
},
"digest": {
"length": 802.0,
"function_hash": "91452812511586451376991397144715715683"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4dc3a3893dae5a7f73e5809273aca0f1f3548d55",
"signature_version": "v1"
},
{
"id": "CVE-2024-40930-d9e50bd8",
"target": {
"file": "net/wireless/scan.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"131705648371446531961421683992095955239",
"117220197958483874727630394774782512254",
"132349145714496605730219651050545227072",
"227998677670098546790593341773719332274"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4dc3a3893dae5a7f73e5809273aca0f1f3548d55",
"signature_version": "v1"
},
{
"id": "CVE-2024-40930-f6420948",
"target": {
"file": "net/wireless/scan.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"131705648371446531961421683992095955239",
"117220197958483874727630394774782512254",
"132349145714496605730219651050545227072",
"227998677670098546790593341773719332274"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f15e3e13e14cc5ae8f950c16efe706add18ac8e2",
"signature_version": "v1"
}
]