Skip to main content

CVE-2024-35789: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-35789cvecve-2024-35789
Published: Fri May 17 2024 (05/17/2024, 12:24:42 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes When moving a station out of a VLAN and deleting the VLAN afterwards, the fast_rx entry still holds a pointer to the VLAN's netdev, which can cause use-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx after the VLAN change.

AI-Powered Analysis

AILast updated: 07/04/2025, 05:56:07 UTC

Technical Analysis

CVE-2024-35789 is a vulnerability identified in the Linux kernel's mac80211 wireless subsystem, specifically related to handling VLAN (Virtual Local Area Network) changes for stations (wireless clients) that do not use 4-address frames. The issue arises when a station is moved out of a VLAN and the VLAN is subsequently deleted. In this scenario, the fast_rx entry, which is an optimization structure used to speed up packet reception, retains a pointer to the VLAN's network device (netdev). Because the VLAN has been deleted, this pointer becomes a dangling reference, leading to a use-after-free condition. Use-after-free vulnerabilities occur when software continues to use memory after it has been freed, potentially causing memory corruption, system crashes, or enabling attackers to execute arbitrary code. The fix implemented involves immediately invoking the ieee80211_check_fast_rx function after the VLAN change to clear or update the fast_rx entry, ensuring that no stale pointers remain. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes, indicating it is present in various recent kernel builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. However, the vulnerability resides in a core networking component of the Linux kernel, which is widely used in servers, desktops, and embedded devices, especially those with wireless networking capabilities.

Potential Impact

For European organizations, the impact of CVE-2024-35789 could be significant, particularly for those relying on Linux-based infrastructure with wireless networking. Exploitation of this use-after-free vulnerability could lead to denial of service (system crashes) or potentially allow attackers to execute arbitrary code with kernel privileges, compromising system integrity and confidentiality. This could affect enterprise wireless access points, Linux-based IoT devices, and servers that manage VLANs for network segmentation. Given the widespread use of Linux in critical infrastructure, telecommunications, and government networks across Europe, a successful exploit could disrupt business operations, leak sensitive data, or provide a foothold for further attacks. The absence of known exploits suggests limited immediate risk, but the vulnerability's nature and kernel-level impact warrant proactive mitigation to prevent future exploitation. Organizations with complex VLAN setups and wireless deployments are particularly at risk.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions where this vulnerability is patched. Since the issue involves VLAN changes and wireless networking, administrators should audit their network configurations to identify systems using mac80211 and VLANs with non-4addr stations. Specific mitigation steps include: 1) Applying the latest kernel patches or upgrading to a kernel version that includes the fix for CVE-2024-35789. 2) Reviewing and minimizing VLAN reconfiguration operations on wireless stations where possible, to reduce exposure. 3) Implementing strict access controls and monitoring on systems managing VLANs and wireless interfaces to detect unusual activity that could indicate exploitation attempts. 4) Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Control Flow Integrity (CFI) to reduce exploitation success. 5) Testing updates in controlled environments before deployment to ensure stability, given the kernel-level nature of the patch. 6) Maintaining up-to-date intrusion detection systems capable of identifying anomalous kernel or network behavior related to wireless VLAN operations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T12:19:12.338Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aebfd6

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 5:56:07 AM

Last updated: 8/1/2025, 8:56:50 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats