Vulnerability Details : CVE-2024-35937
In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: check A-MSDU format more carefully
If it looks like there's another subframe in the A-MSDU
but the header isn't fully there, we can end up reading
data out of bounds, only to discard later. Make this a
bit more careful and check if the subframe header can
even be present.
Products affected by CVE-2024-35937
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-35937
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 15 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-35937
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
1.8
|
5.2
|
NIST | 2025-03-06 |
CWE ids for CVE-2024-35937
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Secondary)
References for CVE-2024-35937
-
https://git.kernel.org/stable/c/9eb3bc0973d084423a6df21cf2c74692ff05647e
wifi: cfg80211: check A-MSDU format more carefully - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/9ad7974856926129f190ffbe3beea78460b3b7cc
wifi: cfg80211: check A-MSDU format more carefully - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/16da1e1dac23be45ef6e23c41b1508c400e6c544
wifi: cfg80211: check A-MSDU format more carefully - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/5d7a8585fbb31e88fb2a0f581b70667d3300d1e9
wifi: cfg80211: check A-MSDU format more carefully - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to