Bug 2334406 (CVE-2024-53189) - CVE-2024-53189 kernel: wifi: nl80211: fix bounds checker error in nl80211_parse_sched_scan
Summary: CVE-2024-53189 kernel: wifi: nl80211: fix bounds checker error in nl80211_par...
Keywords:
Status: NEW
Alias: CVE-2024-53189
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-12-27 14:04 UTC by OSIDB Bzimport
Modified: 2024-12-28 10:46 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-12-27 14:04:55 UTC
In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: fix bounds checker error in nl80211_parse_sched_scan

The channels array in the cfg80211_scan_request has a __counted_by
attribute attached to it, which points to the n_channels variable. This
attribute is used in bounds checking, and if it is not set before the
array is filled, then the bounds sanitizer will issue a warning or a
kernel panic if CONFIG_UBSAN_TRAP is set.

This patch sets the size of allocated memory as the initial value for
n_channels. It is updated with the actual number of added elements after
the array is filled.

Comment 1 Avinash Hanwate 2024-12-28 10:43:20 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024122722-CVE-2024-53189-1b90@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.