CVE-2024-35838

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential sta-link leak When a station is allocated, links are added but not set to valid yet (e.g. during connection to an AP MLD), we might remove the station without ever marking links valid, and leak them. Fix that.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*

History

19 Sep 2025, 18:41

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
References () https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1 - () https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1 - Patch
References () https://git.kernel.org/stable/c/587c5892976108674bbe61a8ff659de279318034 - () https://git.kernel.org/stable/c/587c5892976108674bbe61a8ff659de279318034 - Patch
References () https://git.kernel.org/stable/c/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26 - () https://git.kernel.org/stable/c/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26 - Patch
References () https://git.kernel.org/stable/c/e04bf59bdba0fa45d52160be676114e16be855a9 - () https://git.kernel.org/stable/c/e04bf59bdba0fa45d52160be676114e16be855a9 - Patch

21 Nov 2024, 09:21

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige una posible fuga de sta-link Cuando se asigna una estación, los enlaces se agregan pero aún no se configuran como válidos (por ejemplo, durante la conexión a un AP MLD), podríamos eliminar la estación sin marcar enlaces válidos y filtrarlos. Arregla eso.
References () https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1 - () https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1 -
References () https://git.kernel.org/stable/c/587c5892976108674bbe61a8ff659de279318034 - () https://git.kernel.org/stable/c/587c5892976108674bbe61a8ff659de279318034 -
References () https://git.kernel.org/stable/c/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26 - () https://git.kernel.org/stable/c/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26 -
References () https://git.kernel.org/stable/c/e04bf59bdba0fa45d52160be676114e16be855a9 - () https://git.kernel.org/stable/c/e04bf59bdba0fa45d52160be676114e16be855a9 -

17 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 14:15

Updated : 2025-09-19 18:41


NVD link : CVE-2024-35838

Mitre link : CVE-2024-35838

CVE.ORG link : CVE-2024-35838


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime