CVE-2024-35913

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35913
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35913.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35913
Downstream
Related
Published
2024-05-19T08:35:06Z
Modified
2025-10-17T03:59:51.118880Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: pick the version of SESSIONPROTECTIONNOTIF

When we want to know whether we should look for the macid or the linkid in struct iwlmvmsessionprotnotif, we should look at the version of SESSIONPROTECTIONNOTIF.

This causes WARNINGs:

WARNING: CPU: 0 PID: 11403 at drivers/net/wireless/intel/iwlwifi/mvm/time-event.c:959 iwlmvmrxsessionprotectnotif+0x333/0x340 [iwlmvm] RIP: 0010:iwlmvmrxsessionprotectnotif+0x333/0x340 [iwlmvm] Code: 00 49 c7 84 24 48 07 00 00 00 00 00 00 41 c6 84 24 78 07 00 00 ff 4c 89 f7 e8 e9 71 54 d9 e9 7d fd ff ff 0f 0b e9 23 fe ff ff <0f> 0b e9 1c fe ff ff 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffb4bb00003d40 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff9ae63a361000 RCX: ffff9ae4a98b60d4 RDX: ffff9ae4588499c0 RSI: 0000000000000305 RDI: ffff9ae4a98b6358 RBP: ffffb4bb00003d68 R08: 0000000000000003 R09: 0000000000000010 R10: ffffb4bb00003d00 R11: 000000000000000f R12: ffff9ae441399050 R13: ffff9ae4761329e8 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff9ae7af400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055fb75680018 CR3: 00000003dae32006 CR4: 0000000000f70ef0 PKRU: 55555554 Call Trace: <IRQ> ? showregs+0x69/0x80 ? _warn+0x8d/0x150 ? iwlmvmrxsessionprotectnotif+0x333/0x340 [iwlmvm] ? reportbug+0x196/0x1c0 ? handlebug+0x45/0x80 ? excinvalidop+0x1c/0xb0 ? asmexcinvalidop+0x1f/0x30 ? iwlmvmrxsessionprotectnotif+0x333/0x340 [iwlmvm] iwlmvmrxcommon+0x115/0x340 [iwlmvm] iwlmvmrxmq+0xa6/0x100 [iwlmvm] iwlpcierxhandle+0x263/0xa10 [iwlwifi] iwlpcienapipollmsix+0x32/0xd0 [iwlwifi]

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
085d33c53012866b6c088b69b603af7cf69c0a53
Fixed
222abd95f503e28c0404e596291fe472fe90929c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
085d33c53012866b6c088b69b603af7cf69c0a53
Fixed
bbe806c294c9c4cd1221140d96e5f367673e393a

Affected versions

v6.*

v6.6
v6.6-rc6
v6.6-rc7
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.8.1
v6.8.2
v6.8.3
v6.8.4

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.5