Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-41071

Опубликовано: 29 июл. 2024
Источник: redhat

Описание

No description is available for this CVE.

Отчет

This CVE has been marked as Rejected by the assigning CNA.

Меры по смягчению последствий

There are no mitigations for the flaw. Please update your system for fixes.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONkernelFixedRHSA-2024:722726.09.2024
Red Hat Enterprise Linux 7.7 Advanced Update SupportkernelFixedRHSA-2024:699924.09.2024
Red Hat Enterprise Linux 7 Extended Lifecycle Supportkernel-rtFixedRHSA-2024:699524.09.2024
Red Hat Enterprise Linux 7 Extended Lifecycle SupportkernelFixedRHSA-2024:699424.09.2024
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2024:700124.09.2024
Red Hat Enterprise Linux 8kernelFixedRHSA-2024:700024.09.2024
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2024:742901.10.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportkernelFixedRHSA-2024:699224.09.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportkernelFixedRHSA-2024:700224.09.2024

Показывать по

Дополнительная информация

Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2300448kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing

Связанные уязвимости

ubuntu
больше 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

nvd
больше 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVSS3: 7.8
github
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req->n_channels must be set before req->channels[] can be used. This patch fixes one of the issues encountered in [1]. [ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4 [ 83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]' [...] [ 83.964264] Call Trace: [ 83.964267] <TASK> [ 83.964269] dump_stack_lvl+0x3f/0xc0 [ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110 [ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0 [ 83.964281] __ieee80211_start_scan+0x601/0x990 [ 83.964291] nl80211_trigger_scan+0x874/0x980 [ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160 [ 83.964298] genl_rcv_msg+0x240/0x270 [...] [1] https://bugzilla.kernel.org/show_bug.cgi?id=218810

oracle-oval
больше 1 года назад

ELSA-2024-6994: kernel security update (IMPORTANT)

CVSS3: 7.8
fstec
почти 2 года назад

Уязвимость функции ieee80211_prep_hw_scan() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации