In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: Avoid address calculations via out of bounds array indexing
Before request->channels[] can be used, request->n_channels must be set.
Additionally, address calculations for memory after the "channels" array
need to be calculated from the allocation base ("request") rather than
via the first "out of bounds" index of "channels", otherwise run-time
bounds checking will throw a warning.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 30 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | ssvc 
 | 
Tue, 24 Sep 2024 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat Redhat enterprise Linux | |
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 | |
| Vendors & Products | Redhat Redhat enterprise Linux | 
Fri, 30 Aug 2024 13:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Linux Linux linux Kernel | |
| Weaknesses | CWE-129 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Vendors & Products | Linux Linux linux Kernel | |
| Metrics | cvssV3_1 
 | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published: 2024-06-19T13:35:30.893Z
Updated: 2025-05-04T09:14:09.844Z
Reserved: 2024-06-18T19:36:34.922Z
Link: CVE-2024-38562
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T04:12:25.797Z
 NVD
                        NVD
                    Status : Modified
Published: 2024-06-19T14:15:16.393
Modified: 2024-11-21T09:26:21.197
Link: CVE-2024-38562
 Redhat
                        Redhat