CVE-2024-53189

high

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: fix bounds checker error in nl80211_parse_sched_scan The channels array in the cfg80211_scan_request has a __counted_by attribute attached to it, which points to the n_channels variable. This attribute is used in bounds checking, and if it is not set before the array is filled, then the bounds sanitizer will issue a warning or a kernel panic if CONFIG_UBSAN_TRAP is set. This patch sets the size of allocated memory as the initial value for n_channels. It is updated with the actual number of added elements after the array is filled.

References

https://git.kernel.org/stable/c/d4ef643ea78c59c22546046c25dc6e7206267672

https://git.kernel.org/stable/c/9c46a3a5b394d6d123866aa44436fc2cd342eb0d

https://git.kernel.org/stable/c/1a7b62ddf2c7642878c24f0e556041bb58c37527

Details

Source: Mitre, NVD

Published: 2024-12-27

Updated: 2024-12-27

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High