{"uuid": "40e70526-ffaa-499e-a585-7e1f3c17e322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57898", "type": "seen", "source": "https://t.me/cvedetector/15445", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57898 - Linux Kernel wifi cfg80211 Link ID Information Leak Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57898 \nPublished : Jan. 15, 2025, 1:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: cfg80211: clear link ID from bitmap during link delete after clean up  \n  \nCurrently, during link deletion, the link ID is first removed from the  \nvalid_links bitmap before performing any clean-up operations. However, some  \nfunctions require the link ID to remain in the valid_links bitmap. One  \nsuch example is cfg80211_cac_event(). The flow is -  \n  \nnl80211_remove_link()  \n    cfg80211_remove_link()  \n        ieee80211_del_intf_link()  \n            ieee80211_vif_set_links()  \n                ieee80211_vif_update_links()  \n                    ieee80211_link_stop()  \n                        cfg80211_cac_event()  \n  \ncfg80211_cac_event() requires link ID to be present but it is cleared  \nalready in cfg80211_remove_link(). Ultimately, WARN_ON() is hit.  \n  \nTherefore, clear the link ID from the bitmap only after completing the link  \nclean-up. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T15:06:47.000000Z"}