CVE-2024-35838: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential sta-link leak When a station is allocated, links are added but not set to valid yet (e.g. during connection to an AP MLD), we might remove the station without ever marking links valid, and leak them. Fix that.
AI Analysis
Technical Summary
CVE-2024-35838 is a vulnerability identified in the Linux kernel's mac80211 wireless subsystem, specifically related to the handling of station (STA) link allocations during Multi-Link Device (MLD) connections to Access Points (APs). The issue arises when a station is allocated and associated links are added but not yet marked as valid. If the station is removed before these links are marked valid, the links may not be properly freed, resulting in a resource leak. This leak occurs because the kernel fails to clean up the allocated link structures correctly, potentially leading to memory exhaustion or degraded wireless subsystem performance over time. The vulnerability does not directly allow code execution or privilege escalation but could impact system stability and availability by exhausting kernel resources. The flaw was addressed by ensuring that links are correctly marked valid or cleaned up upon station removal, preventing the leak. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions prior to the patch commit identified by the hash cb71f1d136a635decf43c3b502ee34fb05640fcd. This issue is technical and specific to the mac80211 Wi-Fi stack, which is widely used in Linux-based systems for wireless networking.
Potential Impact
For European organizations, the impact of CVE-2024-35838 primarily concerns systems running Linux kernels with the vulnerable mac80211 wireless stack, which is common in servers, desktops, embedded devices, and network infrastructure equipment. The resource leak could lead to gradual degradation of wireless connectivity or kernel stability, potentially causing denial of service conditions in critical systems relying on Wi-Fi connectivity. This is particularly relevant for organizations with large-scale deployments of Linux-based wireless access points, IoT devices, or edge computing nodes. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could disrupt business operations, especially in sectors like telecommunications, manufacturing, and public services where wireless connectivity is essential. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental service interruptions. Organizations with strict uptime requirements or those operating in environments with limited physical access to devices may face operational challenges if the leak leads to system instability.
Mitigation Recommendations
To mitigate CVE-2024-35838, European organizations should prioritize updating Linux kernel versions to those including the patch commit cb71f1d136a635decf43c3b502ee34fb05640fcd or later. Kernel updates should be tested and deployed promptly, especially on devices providing critical wireless connectivity. For embedded or IoT devices where kernel upgrades are challenging, consider implementing monitoring of kernel memory usage and wireless subsystem logs to detect early signs of resource leaks. Network administrators should also review wireless device configurations to minimize unnecessary station allocations and disconnections that could trigger the leak. Employing automated patch management systems and maintaining an inventory of devices running vulnerable kernel versions will aid in comprehensive remediation. Additionally, organizations should engage with Linux distribution vendors for backported patches if upgrading the kernel is not immediately feasible. Finally, documenting and rehearsing incident response procedures for wireless network disruptions will help mitigate operational impacts if the vulnerability is exploited or causes instability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-35838: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential sta-link leak When a station is allocated, links are added but not set to valid yet (e.g. during connection to an AP MLD), we might remove the station without ever marking links valid, and leak them. Fix that.
AI-Powered Analysis
Technical Analysis
CVE-2024-35838 is a vulnerability identified in the Linux kernel's mac80211 wireless subsystem, specifically related to the handling of station (STA) link allocations during Multi-Link Device (MLD) connections to Access Points (APs). The issue arises when a station is allocated and associated links are added but not yet marked as valid. If the station is removed before these links are marked valid, the links may not be properly freed, resulting in a resource leak. This leak occurs because the kernel fails to clean up the allocated link structures correctly, potentially leading to memory exhaustion or degraded wireless subsystem performance over time. The vulnerability does not directly allow code execution or privilege escalation but could impact system stability and availability by exhausting kernel resources. The flaw was addressed by ensuring that links are correctly marked valid or cleaned up upon station removal, preventing the leak. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions prior to the patch commit identified by the hash cb71f1d136a635decf43c3b502ee34fb05640fcd. This issue is technical and specific to the mac80211 Wi-Fi stack, which is widely used in Linux-based systems for wireless networking.
Potential Impact
For European organizations, the impact of CVE-2024-35838 primarily concerns systems running Linux kernels with the vulnerable mac80211 wireless stack, which is common in servers, desktops, embedded devices, and network infrastructure equipment. The resource leak could lead to gradual degradation of wireless connectivity or kernel stability, potentially causing denial of service conditions in critical systems relying on Wi-Fi connectivity. This is particularly relevant for organizations with large-scale deployments of Linux-based wireless access points, IoT devices, or edge computing nodes. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could disrupt business operations, especially in sectors like telecommunications, manufacturing, and public services where wireless connectivity is essential. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental service interruptions. Organizations with strict uptime requirements or those operating in environments with limited physical access to devices may face operational challenges if the leak leads to system instability.
Mitigation Recommendations
To mitigate CVE-2024-35838, European organizations should prioritize updating Linux kernel versions to those including the patch commit cb71f1d136a635decf43c3b502ee34fb05640fcd or later. Kernel updates should be tested and deployed promptly, especially on devices providing critical wireless connectivity. For embedded or IoT devices where kernel upgrades are challenging, consider implementing monitoring of kernel memory usage and wireless subsystem logs to detect early signs of resource leaks. Network administrators should also review wireless device configurations to minimize unnecessary station allocations and disconnections that could trigger the leak. Employing automated patch management systems and maintaining an inventory of devices running vulnerable kernel versions will aid in comprehensive remediation. Additionally, organizations should engage with Linux distribution vendors for backported patches if upgrading the kernel is not immediately feasible. Finally, documenting and rehearsing incident response procedures for wireless network disruptions will help mitigate operational impacts if the vulnerability is exploited or causes instability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.104Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe35f5
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 4:26:33 PM
Last updated: 8/17/2025, 3:00:19 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.