We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix buffer overflow in elem comparison For vendor elements, the code here assumes that 5 octets are present without checking. Since the element itself is already checked to fit, we only need to check the length.
Reserved 2024-08-22 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/f5c2ec288a865dbe3706b09bed12302e9f6d696b
git.kernel.org/...c/9e6b79a3cd17620d467311b30d56f2648f6880aa
git.kernel.org/...c/88a6fe3707888bd1893e9741157a7035c4159ab6
git.kernel.org/...c/391cb872553627bdcf236c03ee7d5adb275e37e1
git.kernel.org/...c/9f16b5c82a025cd4c864737409234ddc44fb166a
Support options