CVE-2024-53074

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53074
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53074.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53074
Downstream
Related
Published
2024-11-19T17:31:39Z
Modified
2025-10-15T03:50:07.895515Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
wifi: iwlwifi: mvm: don't leak a link on AP removal
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't leak a link on AP removal

Release the link mapping resource in AP removal. This impacted devices that do not support the MLD API (9260 and down). On those devices, we couldn't start the AP again after the AP has been already started and stopped.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a8b5d4809b503da668966a8187b9872e6c85291c
Fixed
70ddf9ce1894c48dbbf10b0de51a95e4fb3dd376
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a8b5d4809b503da668966a8187b9872e6c85291c
Fixed
3ed092997a004d68a3a5b0eeb94e71b69839d0f7

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.11.4
v6.11.5
v6.11.6
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

{
    "vanir_signatures": [
        {
            "signature_type": "Function",
            "digest": {
                "length": 1743.0,
                "function_hash": "198018363779253511828625331216687289819"
            },
            "id": "CVE-2024-53074-616f90ed",
            "deprecated": false,
            "target": {
                "function": "iwl_mvm_mac_remove_interface",
                "file": "drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c"
            },
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@70ddf9ce1894c48dbbf10b0de51a95e4fb3dd376"
        },
        {
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "199352319893755854821782514503796940380",
                    "265621218345246894746495116186643374051",
                    "68416211531301909795188515143950336050",
                    "210472464547239860211651869098388590957",
                    "10676641763349293806552124963396304266",
                    "159412949462739284268401183430781514338",
                    "137223522171525414260751688751069447586",
                    "175546214307480258969617243712337043788"
                ]
            },
            "id": "CVE-2024-53074-b796c8e7",
            "deprecated": false,
            "target": {
                "file": "drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c"
            },
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@70ddf9ce1894c48dbbf10b0de51a95e4fb3dd376"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.11.7