In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
In some versions of cfg80211, the ssids poinet might be a valid one even
though n_ssids is 0. Accessing the pointer in this case will cuase an
out-of-bound access. Fix this by checking n_ssids first.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Sep 2024 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:8 |
Tue, 24 Sep 2024 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:8::nfv |
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 28 Aug 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2024-12-19T09:08:23.310Z
Reserved: 2024-07-12T12:17:45.583Z
Link: CVE-2024-40929

Updated: 2024-09-11T12:42:14.230Z

Status : Awaiting Analysis
Published: 2024-07-12T13:15:15.610
Modified: 2024-11-21T09:31:53.453
Link: CVE-2024-40929
