From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - The vulnerability is described as “wifi: mac80211: don't use rate mask for offchannel TX either”. - It arises from not correctly using the rate mask during scanning or off-channel transmission. 2. Fix Measures: - The fix involves ignoring incorrect settings to avoid unsupported rate warnings reported by syzbot. - It addresses commit 9df66d5b9f45 (“cfg80211: fix default HE tx bitrate mask in 2G band”), which fixed the issue of the default HE transmit bitrate mask in the 2G band. 3. Related Links: - Details of the fixed commit: https://lore.kernel.org/linux-wireless/6ab2dc9c3afe753ca6fcd1421e7a1f47e87b84.camel@sipsolutions.net/T/#m2ac2a6d2be06a37c9c47a3d8a44b4f647ed4f024 - Syzbot report link: https://lore.kernel.org/linux-wireless/8dd98a9e98ee28dc484a@syzkaller.appspotmail.com 4. Code Changes: - Modifications were made to files: , , , and . - Changes include adding a new enum value in , and introducing new control flags in , , and . 5. Author and Commit Information: - Author: Ping-Ke Shih, commit time: 2024-07-29 15:48:16 +0800. - Committer: Johannes Berg, commit time: 2024-07-27 10:13:23 +0200. This information helps us understand the vulnerability’s background, the applied fix, and the specific code changes made.