{"uuid": "d474b5d8-bed3-4721-9ca9-ee3d2581979c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57899", "type": "seen", "source": "https://t.me/cvedetector/15446", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57899 - IBM WiFi 802.11 Bitwise Operation Integer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57899 \nPublished : Jan. 15, 2025, 1:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: mac80211: fix mbss changed flags corruption on 32 bit systems  \n  \nOn 32-bit systems, the size of an unsigned long is 4 bytes,  \nwhile a u64 is 8 bytes. Therefore, when using  \nor_each_set_bit(bit, &amp;bits, sizeof(changed) * BITS_PER_BYTE),  \nthe code is incorrectly searching for a bit in a 32-bit  \nvariable that is expected to be 64 bits in size,  \nleading to incorrect bit finding.  \n  \nSolution: Ensure that the size of the bits variable is correctly  \nadjusted for each architecture.  \n  \n Call Trace:  \n  ? show_regs+0x54/0x58  \n  ? __warn+0x6b/0xd4  \n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]  \n  ? report_bug+0x113/0x150  \n  ? exc_overflow+0x30/0x30  \n  ? handle_bug+0x27/0x44  \n  ? exc_invalid_op+0x18/0x50  \n  ? handle_exception+0xf6/0xf6  \n  ? exc_overflow+0x30/0x30  \n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]  \n  ? exc_overflow+0x30/0x30  \n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]  \n  ? ieee80211_mesh_work+0xff/0x260 [mac80211]  \n  ? cfg80211_wiphy_work+0x72/0x98 [cfg80211]  \n  ? process_one_work+0xf1/0x1fc  \n  ? worker_thread+0x2c0/0x3b4  \n  ? kthread+0xc7/0xf0  \n  ? mod_delayed_work_on+0x4c/0x4c  \n  ? kthread_complete_and_exit+0x14/0x14  \n  ? ret_from_fork+0x24/0x38  \n  ? kthread_complete_and_exit+0x14/0x14  \n  ? ret_from_fork_asm+0xf/0x14  \n  ? entry_INT80_32+0xf0/0xf0  \n  \n[restore no-op path for no changes] \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T15:06:48.000000Z"}