Skip to main content

CVE-2024-35838: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35838cvecve-2024-35838
Published: Fri May 17 2024 (05/17/2024, 14:02:36 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential sta-link leak When a station is allocated, links are added but not set to valid yet (e.g. during connection to an AP MLD), we might remove the station without ever marking links valid, and leak them. Fix that.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:26:33 UTC

Technical Analysis

CVE-2024-35838 is a vulnerability identified in the Linux kernel's mac80211 wireless subsystem, specifically related to the handling of station (STA) link allocations during Multi-Link Device (MLD) connections to Access Points (APs). The issue arises when a station is allocated and associated links are added but not yet marked as valid. If the station is removed before these links are marked valid, the links may not be properly freed, resulting in a resource leak. This leak occurs because the kernel fails to clean up the allocated link structures correctly, potentially leading to memory exhaustion or degraded wireless subsystem performance over time. The vulnerability does not directly allow code execution or privilege escalation but could impact system stability and availability by exhausting kernel resources. The flaw was addressed by ensuring that links are correctly marked valid or cleaned up upon station removal, preventing the leak. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions prior to the patch commit identified by the hash cb71f1d136a635decf43c3b502ee34fb05640fcd. This issue is technical and specific to the mac80211 Wi-Fi stack, which is widely used in Linux-based systems for wireless networking.

Potential Impact

For European organizations, the impact of CVE-2024-35838 primarily concerns systems running Linux kernels with the vulnerable mac80211 wireless stack, which is common in servers, desktops, embedded devices, and network infrastructure equipment. The resource leak could lead to gradual degradation of wireless connectivity or kernel stability, potentially causing denial of service conditions in critical systems relying on Wi-Fi connectivity. This is particularly relevant for organizations with large-scale deployments of Linux-based wireless access points, IoT devices, or edge computing nodes. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could disrupt business operations, especially in sectors like telecommunications, manufacturing, and public services where wireless connectivity is essential. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental service interruptions. Organizations with strict uptime requirements or those operating in environments with limited physical access to devices may face operational challenges if the leak leads to system instability.

Mitigation Recommendations

To mitigate CVE-2024-35838, European organizations should prioritize updating Linux kernel versions to those including the patch commit cb71f1d136a635decf43c3b502ee34fb05640fcd or later. Kernel updates should be tested and deployed promptly, especially on devices providing critical wireless connectivity. For embedded or IoT devices where kernel upgrades are challenging, consider implementing monitoring of kernel memory usage and wireless subsystem logs to detect early signs of resource leaks. Network administrators should also review wireless device configurations to minimize unnecessary station allocations and disconnections that could trigger the leak. Employing automated patch management systems and maintaining an inventory of devices running vulnerable kernel versions will aid in comprehensive remediation. Additionally, organizations should engage with Linux distribution vendors for backported patches if upgrading the kernel is not immediately feasible. Finally, documenting and rehearsing incident response procedures for wireless network disruptions will help mitigate operational impacts if the vulnerability is exploited or causes instability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.104Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe35f5

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:26:33 PM

Last updated: 8/17/2025, 3:00:19 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats