First published: Tue Nov 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't leak a link on AP removal Release the link mapping resource in AP removal. This impacted devices that do not support the MLD API (9260 and down). On those devices, we couldn't start the AP again after the AP has been already started and stopped.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.9<6.11.7 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
Linux Kernel | =6.12-rc6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-53074 is considered to be moderate due to its potential impact on devices not supporting the MLD API.
To fix CVE-2024-53074, update the Linux kernel to a patched version version above 6.11.7 or 6.12-rc6.
CVE-2024-53074 affects Linux kernel versions from 6.9 to 6.11.7 and specific releases of 6.12 rc1 to rc6.
CVE-2024-53074 affects the iwlwifi driver related to the management of links during access point removal.
CVE-2024-53074 is primarily a local vulnerability affecting devices that manage Wi-Fi connections.