#VU95106 Input validation error in Linux kernel - CVE-2024-41072
Published: July 31, 2024 / Updated: May 12, 2025
Vulnerability identifier: #VU95106
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-41072
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cfg80211_wext_siwscan() function in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/b02ba9a0b55b762bd04743a22f3d9f9645005e79
- https://git.kernel.org/stable/c/de5fcf757e33596eed32de170ce5a93fa44dd2ac
- https://git.kernel.org/stable/c/6295bad58f988eaafcf0e6f8b198a580398acb3b
- https://git.kernel.org/stable/c/a43cc0558530b6c065976b6b9246f512f8d3593b
- https://git.kernel.org/stable/c/001120ff0c9e3557dee9b5ee0d358e0fc189996f
- https://git.kernel.org/stable/c/fe9644efd86704afe50e56b64b609de340ab7c95
- https://git.kernel.org/stable/c/35cee10ccaee5bd451a480521bbc25dc9f07fa5b
- https://git.kernel.org/stable/c/6ef09cdc5ba0f93826c09d810c141a8d103a80fc
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.319
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.223
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.164
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.281
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.101
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.42