{"vulnerability": "CVE-2024-57899", "sightings": [{"uuid": "57b0b771-3d25-4713-a475-c6d272a7697f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57899", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfrtzfmzug2e", "content": "", "creation_timestamp": "2025-01-15T13:17:11.023033Z"}, {"uuid": "d26eb9e4-0425-4f9d-b009-e7a1d74d593c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57899", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfrvq6odww2g", "content": "", "creation_timestamp": "2025-01-15T13:47:49.488340Z"}, {"uuid": "98857dc2-9cbe-4787-b771-f8e16c8f6a48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-57899", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "d8cb8c0e-f16d-476d-b8e9-852b4b08561a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57899", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "d474b5d8-bed3-4721-9ca9-ee3d2581979c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57899", "type": "seen", "source": "https://t.me/cvedetector/15446", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57899 - IBM WiFi 802.11 Bitwise Operation Integer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57899 \nPublished : Jan. 15, 2025, 1:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: mac80211: fix mbss changed flags corruption on 32 bit systems  \n  \nOn 32-bit systems, the size of an unsigned long is 4 bytes,  \nwhile a u64 is 8 bytes. Therefore, when using  \nor_each_set_bit(bit, &amp;bits, sizeof(changed) * BITS_PER_BYTE),  \nthe code is incorrectly searching for a bit in a 32-bit  \nvariable that is expected to be 64 bits in size,  \nleading to incorrect bit finding.  \n  \nSolution: Ensure that the size of the bits variable is correctly  \nadjusted for each architecture.  \n  \n Call Trace:  \n  ? show_regs+0x54/0x58  \n  ? __warn+0x6b/0xd4  \n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]  \n  ? report_bug+0x113/0x150  \n  ? exc_overflow+0x30/0x30  \n  ? handle_bug+0x27/0x44  \n  ? exc_invalid_op+0x18/0x50  \n  ? handle_exception+0xf6/0xf6  \n  ? exc_overflow+0x30/0x30  \n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]  \n  ? exc_overflow+0x30/0x30  \n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]  \n  ? ieee80211_mesh_work+0xff/0x260 [mac80211]  \n  ? cfg80211_wiphy_work+0x72/0x98 [cfg80211]  \n  ? process_one_work+0xf1/0x1fc  \n  ? worker_thread+0x2c0/0x3b4  \n  ? kthread+0xc7/0xf0  \n  ? mod_delayed_work_on+0x4c/0x4c  \n  ? kthread_complete_and_exit+0x14/0x14  \n  ? ret_from_fork+0x24/0x38  \n  ? kthread_complete_and_exit+0x14/0x14  \n  ? ret_from_fork_asm+0xf/0x14  \n  ? entry_INT80_32+0xf0/0xf0  \n  \n[restore no-op path for no changes] \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T15:06:48.000000Z"}, {"uuid": "df390441-21d3-430f-a957-55f0670e4443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57899", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1752", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57899\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix mbss changed flags corruption on 32 bit systems\n\nOn 32-bit systems, the size of an unsigned long is 4 bytes,\nwhile a u64 is 8 bytes. Therefore, when using\nor_each_set_bit(bit, &amp;bits, sizeof(changed) * BITS_PER_BYTE),\nthe code is incorrectly searching for a bit in a 32-bit\nvariable that is expected to be 64 bits in size,\nleading to incorrect bit finding.\n\nSolution: Ensure that the size of the bits variable is correctly\nadjusted for each architecture.\n\n Call Trace:\n  ? show_regs+0x54/0x58\n  ? __warn+0x6b/0xd4\n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]\n  ? report_bug+0x113/0x150\n  ? exc_overflow+0x30/0x30\n  ? handle_bug+0x27/0x44\n  ? exc_invalid_op+0x18/0x50\n  ? handle_exception+0xf6/0xf6\n  ? exc_overflow+0x30/0x30\n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]\n  ? exc_overflow+0x30/0x30\n  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]\n  ? ieee80211_mesh_work+0xff/0x260 [mac80211]\n  ? cfg80211_wiphy_work+0x72/0x98 [cfg80211]\n  ? process_one_work+0xf1/0x1fc\n  ? worker_thread+0x2c0/0x3b4\n  ? kthread+0xc7/0xf0\n  ? mod_delayed_work_on+0x4c/0x4c\n  ? kthread_complete_and_exit+0x14/0x14\n  ? ret_from_fork+0x24/0x38\n  ? kthread_complete_and_exit+0x14/0x14\n  ? ret_from_fork_asm+0xf/0x14\n  ? entry_INT80_32+0xf0/0xf0\n\n[restore no-op path for no changes]\n\ud83d\udccf Published: 2025-01-15T13:05:50.701Z\n\ud83d\udccf Modified: 2025-01-15T13:05:50.701Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/86772872f9f5097cd03d0e1c6813238bd38c250b\n2. https://git.kernel.org/stable/c/36b739637d7042843f9df57212ecee6ed6e0d4b2\n3. https://git.kernel.org/stable/c/49dba1ded8dd5a6a12748631403240b2ab245c34", "creation_timestamp": "2025-01-15T14:21:29.000000Z"}]}