In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fix potential sta-link leak
When a station is allocated, links are added but not set to valid yet (e.g. during connection to an AP MLD), we might remove the station without ever marking links valid, and leak them. Fix that.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e04bf59bdba0fa45d52160be676114e16be855a9",
"target": {
"function": "sta_info_free",
"file": "net/mac80211/sta_info.c"
},
"deprecated": false,
"id": "CVE-2024-35838-3a55fb51",
"signature_version": "v1",
"digest": {
"length": 837.0,
"function_hash": "10420231869513451586754074937587760289"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@587c5892976108674bbe61a8ff659de279318034",
"target": {
"function": "sta_info_free",
"file": "net/mac80211/sta_info.c"
},
"deprecated": false,
"id": "CVE-2024-35838-44b72c9f",
"signature_version": "v1",
"digest": {
"length": 837.0,
"function_hash": "10420231869513451586754074937587760289"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26",
"target": {
"file": "net/mac80211/sta_info.c"
},
"deprecated": false,
"id": "CVE-2024-35838-458d16d2",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"42845000331177614182878206193695647375",
"33055588476907906502830529878900359684",
"84761617109652550622237369723712492638",
"286865920487654176806701600828482902138"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@49aaeb8c539b1633b3bd7c2df131ec578aa1eae1",
"target": {
"function": "sta_info_free",
"file": "net/mac80211/sta_info.c"
},
"deprecated": false,
"id": "CVE-2024-35838-508a8599",
"signature_version": "v1",
"digest": {
"length": 871.0,
"function_hash": "237105058212159587423415766988171177904"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e04bf59bdba0fa45d52160be676114e16be855a9",
"target": {
"file": "net/mac80211/sta_info.c"
},
"deprecated": false,
"id": "CVE-2024-35838-7bf0f47f",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"42845000331177614182878206193695647375",
"33055588476907906502830529878900359684",
"84761617109652550622237369723712492638",
"286865920487654176806701600828482902138"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26",
"target": {
"function": "sta_info_free",
"file": "net/mac80211/sta_info.c"
},
"deprecated": false,
"id": "CVE-2024-35838-93c3e86d",
"signature_version": "v1",
"digest": {
"length": 837.0,
"function_hash": "10420231869513451586754074937587760289"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@587c5892976108674bbe61a8ff659de279318034",
"target": {
"file": "net/mac80211/sta_info.c"
},
"deprecated": false,
"id": "CVE-2024-35838-a0d583aa",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"42845000331177614182878206193695647375",
"33055588476907906502830529878900359684",
"84761617109652550622237369723712492638",
"286865920487654176806701600828482902138"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@49aaeb8c539b1633b3bd7c2df131ec578aa1eae1",
"target": {
"file": "net/mac80211/sta_info.c"
},
"deprecated": false,
"id": "CVE-2024-35838-eabbc507",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"42845000331177614182878206193695647375",
"33055588476907906502830529878900359684",
"84761617109652550622237369723712492638",
"286865920487654176806701600828482902138"
]
},
"signature_type": "Line"
}
]