CVE-2024-35946

Source
https://cve.org/CVERecord?id=CVE-2024-35946
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35946.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35946
Downstream
Related
Published
2024-05-19T10:10:49.493Z
Modified
2026-03-13T07:55:25.686661Z
Summary
wifi: rtw89: fix null pointer access when abort scan
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: fix null pointer access when abort scan

During cancel scan we might use vif that weren't scanning. Fix this by using the actual scanning vif.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35946.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e3ec7017f6a20d12ddd9fe23d345ebb7b8c104dd
Fixed
b34d64e9aa5505e3c84570aed5c757f1839573e8
Fixed
4f11c741908dab7dd48fa5a986b210d4fc74ca8d
Fixed
7e11a2966f51695c0af0b1f976a32d64dee243b2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35946.json"