CVE-2024-41071
Linux Wireless MAC80211 Array Index Out of Bounds Vulnerability
Description
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
INFO
Published Date :
July 29, 2024, 3:15 p.m.
Last Modified :
Feb. 5, 2025, 7:15 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Update the affected kernel and related packages.
- Reboot the system if required by updates.
Public PoC/Exploit Available at Github
CVE-2024-41071 has a 2 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
None
HTML C# CSS JavaScript Dockerfile
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-41071 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-41071 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Rejected by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Feb. 05, 2025
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Feb. 05, 2025
Action Type Old Value New Value Changed Description In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req->n_channels must be set before req->channels[] can be used. This patch fixes one of the issues encountered in [1]. [ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4 [ 83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]' [...] [ 83.964264] Call Trace: [ 83.964267] <TASK> [ 83.964269] dump_stack_lvl+0x3f/0xc0 [ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110 [ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0 [ 83.964281] __ieee80211_start_scan+0x601/0x990 [ 83.964291] nl80211_trigger_scan+0x874/0x980 [ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160 [ 83.964298] genl_rcv_msg+0x240/0x270 [...] [1] https://bugzilla.kernel.org/show_bug.cgi?id=218810 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Removed CVSS V3.1 NIST: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Removed CWE NIST: CWE-129 Removed CPE Configuration 3173626 Config Identifier: 0, OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (excluding) 6.9.11 Removed Reference kernel.org: https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718 Removed Reference kernel.org: https://git.kernel.org/stable/c/26b177ecdd311f20de4c379f0630858a675dfc0c Removed Reference kernel.org: https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0 Removed Reference kernel.org: https://git.kernel.org/stable/c/a2bb0c5d0086be5ab5054465dfaa381a1144905c Removed Reference CVE: https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718 Removed Reference CVE: https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0 Removed Reference Type kernel.org: https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718 Types: Patch Removed Reference Type kernel.org: https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0 Types: Patch Removed Reference Type CVE: https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718 Types: Patch Removed Reference Type CVE: https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0 Types: Patch -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718 Added Reference https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0 -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Oct. 17, 2024
Action Type Old Value New Value Added Reference kernel.org https://git.kernel.org/stable/c/a2bb0c5d0086be5ab5054465dfaa381a1144905c [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/26b177ecdd311f20de4c379f0630858a675dfc0c [No types assigned] -
Initial Analysis by [email protected]
Aug. 26, 2024
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Changed Reference Type https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718 No Types Assigned https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718 Patch Changed Reference Type https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0 No Types Assigned https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0 Patch Added CWE NIST CWE-129 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 6.9.11 -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jul. 29, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req->n_channels must be set before req->channels[] can be used. This patch fixes one of the issues encountered in [1]. [ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4 [ 83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]' [...] [ 83.964264] Call Trace: [ 83.964267] <TASK> [ 83.964269] dump_stack_lvl+0x3f/0xc0 [ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110 [ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0 [ 83.964281] __ieee80211_start_scan+0x601/0x990 [ 83.964291] nl80211_trigger_scan+0x874/0x980 [ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160 [ 83.964298] genl_rcv_msg+0x240/0x270 [...] [1] https://bugzilla.kernel.org/show_bug.cgi?id=218810 Added Reference kernel.org https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718 [No types assigned]