Skip to main content

CVE-2024-35946: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35946cvecve-2024-35946
Published: Sun May 19 2024 (05/19/2024, 10:10:49 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix null pointer access when abort scan During cancel scan we might use vif that weren't scanning. Fix this by using the actual scanning vif.

AI-Powered Analysis

AILast updated: 06/29/2025, 08:26:11 UTC

Technical Analysis

CVE-2024-35946 is a vulnerability identified in the Linux kernel specifically within the WiFi driver component 'rtw89'. The issue arises during the process of aborting a WiFi scan operation. The vulnerability is caused by a null pointer dereference due to the kernel using a virtual interface (vif) pointer that was not actively scanning when attempting to cancel a scan. This improper handling can lead to a null pointer access, which typically results in a kernel crash (denial of service) or potentially other undefined behaviors. The root cause is that the code did not correctly track or verify the vif that was actually performing the scan, leading to the use of an invalid or null vif pointer during scan cancellation. The fix implemented involves ensuring that the kernel uses the actual scanning vif when aborting the scan, preventing null pointer dereferences. This vulnerability affects Linux kernel versions containing the referenced commit (e3ec7017f6a20d12ddd9fe23d345ebb7b8c104dd) and likely earlier versions where this code path exists. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication (May 19, 2024). The vulnerability is specific to the rtw89 WiFi driver, which supports certain Realtek wireless chipsets.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential for denial of service on Linux systems using the affected rtw89 WiFi driver. This could manifest as system crashes or kernel panics when WiFi scanning is aborted, leading to service interruptions. Organizations relying on Linux servers, workstations, or embedded devices with affected Realtek WiFi chipsets may experience instability or downtime. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the denial of service could disrupt critical network connectivity, especially in environments where WiFi is essential for operations. This could affect sectors such as telecommunications, manufacturing, healthcare, and public services that use Linux-based systems with these wireless drivers. Since no known exploits exist yet, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent potential future exploitation or accidental service disruptions.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Identify Linux systems using the rtw89 WiFi driver, particularly those with Realtek chipsets supported by this driver. 2) Apply the latest Linux kernel updates or patches that include the fix for CVE-2024-35946 as soon as they become available from their Linux distribution vendors or kernel maintainers. 3) If immediate patching is not possible, consider disabling WiFi scanning or the affected wireless interface temporarily to avoid triggering the vulnerability. 4) Monitor system logs for kernel panics or crashes related to WiFi scanning operations to detect potential exploitation or accidental triggers. 5) For embedded or specialized devices, coordinate with device vendors to obtain firmware or kernel updates addressing this issue. 6) Incorporate this vulnerability into vulnerability management and incident response processes to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.133Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe2234

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 8:26:11 AM

Last updated: 7/29/2025, 7:03:50 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats