In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mvm: guard against invalid STA ID on removal
Guard against invalid station IDs in iwl_mvm_mld_rm_sta_id as that would
result in out-of-bounds array accesses. This prevents issues should the
driver get into a bad state during error handling.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/17f64517bf5c26af56b6c3566273aad6646c3c4f (6.9-rc2)
git.kernel.org/stable/c/17f64517bf5c26af56b6c3566273aad6646c3c4f
git.kernel.org/stable/c/94f80a8ec15e238b78521f20f8afaed60521a294
git.kernel.org/stable/c/fab21d220017daa5fd8a3d788ff25ccfecfaae2f
launchpad.net/bugs/cve/CVE-2024-36921
nvd.nist.gov/vuln/detail/CVE-2024-36921
security-tracker.debian.org/tracker/CVE-2024-36921
www.cve.org/CVERecord?id=CVE-2024-36921