In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
Inthe Linux kernel,the following vulnerabilityhas been resolved:wifi: mac80211: Avoid address calculationsvia out of bounds array indexingreq->n_channels must beset before req->channels[]can be used.This patch fixes one ofthe issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of rangefor type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernelCVE teamhas assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinux kernel, thefollowing vulnerability hasbeen resolved:wifi: mac80211: Avoid address calculations viaout of bounds array indexingreq->n_channels must be setbefore req->channels[] canbe used.This patch fixes one of theissues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range fortype 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVEteam hasassigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the followingvulnerability has been resolved:wifi: mac80211:Avoid address calculations via out of boundsarray indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is outof range fortype 'struct ieee80211_channel *[]'[...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] <ahref= https://bugzilla.kernel.org/show_bug.cgi?id=218810 >https://bugzilla.kernel.org/show_bug.cgi?id=218810</a>The Linux kernel CVE team has assigned CVE-2024-41071 to this issue.
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel,thefollowingvulnerability has been resolved:wifi:mac80211: Avoid address calculations via out ofbounds array indexingreq->n_channels must beset before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-boundsin net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel*[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In theLinux kernel,the followingvulnerability has been resolved:wifi: mac80211:Avoid address calculations viaout of bounds array indexingreq->n_channels mustbe set before req->channels[] can be used.This patch fixes oneof the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264]Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel,the followingvulnerabilityhas been resolved:wifi: mac80211: Avoid addresscalculations via out of boundsarray indexingreq->n_channels must be set beforereq->channels[] can be used.This patch fixes one of the issuesencountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
| linux | | https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: Avoid address calculations via out of bounds array indexingreq->n_channels must be set before req->channels[] can be used.This patch fixes one of the issues encountered in [1].[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4[ 83.964258] index 0 is out of range for type struct ieee80211_channel *[] [...][ 83.964264] Call Trace:[ 83.964267] <TASK>[ 83.964269] dump_stack_lvl+0x3f/0xc0[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0[ 83.964281] __ieee80211_start_scan+0x601/0x990[ 83.964291] nl80211_trigger_scan+0x874/0x980[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160[ 83.964298] genl_rcv_msg+0x240/0x270[...][1] https://bugzilla.kernel.org/show_bug.cgi?id=218810