Skip to main content

CVE-2024-26896: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26896cvecve-2024-26896
Published: Wed Apr 17 2024 (04/17/2024, 10:27:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: wfx: fix memory leak when starting AP Kmemleak reported this error: unreferenced object 0xd73d1180 (size 184): comm "wpa_supplicant", pid 1559, jiffies 13006305 (age 964.245s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 1e 00 01 00 00 00 00 00 ................ backtrace: [<5ca11420>] kmem_cache_alloc+0x20c/0x5ac [<127bdd74>] __alloc_skb+0x144/0x170 [<fb8a5e38>] __netdev_alloc_skb+0x50/0x180 [<0f9fa1d5>] __ieee80211_beacon_get+0x290/0x4d4 [mac80211] [<7accd02d>] ieee80211_beacon_get_tim+0x54/0x18c [mac80211] [<41e25cc3>] wfx_start_ap+0xc8/0x234 [wfx] [<93a70356>] ieee80211_start_ap+0x404/0x6b4 [mac80211] [<a4a661cd>] nl80211_start_ap+0x76c/0x9e0 [cfg80211] [<47bd8b68>] genl_rcv_msg+0x198/0x378 [<453ef796>] netlink_rcv_skb+0xd0/0x130 [<6b7c977a>] genl_rcv+0x34/0x44 [<66b2d04d>] netlink_unicast+0x1b4/0x258 [<f965b9b6>] netlink_sendmsg+0x1e8/0x428 [<aadb8231>] ____sys_sendmsg+0x1e0/0x274 [<d2b5212d>] ___sys_sendmsg+0x80/0xb4 [<69954f45>] __sys_sendmsg+0x64/0xa8 unreferenced object 0xce087000 (size 1024): comm "wpa_supplicant", pid 1559, jiffies 13006305 (age 964.246s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<9a993714>] __kmalloc_track_caller+0x230/0x600 [<f83ea192>] kmalloc_reserve.constprop.0+0x30/0x74 [<a2c61343>] __alloc_skb+0xa0/0x170 [<fb8a5e38>] __netdev_alloc_skb+0x50/0x180 [<0f9fa1d5>] __ieee80211_beacon_get+0x290/0x4d4 [mac80211] [<7accd02d>] ieee80211_beacon_get_tim+0x54/0x18c [mac80211] [<41e25cc3>] wfx_start_ap+0xc8/0x234 [wfx] [<93a70356>] ieee80211_start_ap+0x404/0x6b4 [mac80211] [<a4a661cd>] nl80211_start_ap+0x76c/0x9e0 [cfg80211] [<47bd8b68>] genl_rcv_msg+0x198/0x378 [<453ef796>] netlink_rcv_skb+0xd0/0x130 [<6b7c977a>] genl_rcv+0x34/0x44 [<66b2d04d>] netlink_unicast+0x1b4/0x258 [<f965b9b6>] netlink_sendmsg+0x1e8/0x428 [<aadb8231>] ____sys_sendmsg+0x1e0/0x274 [<d2b5212d>] ___sys_sendmsg+0x80/0xb4 However, since the kernel is build optimized, it seems the stack is not accurate. It appears the issue is related to wfx_set_mfp_ap(). The issue is obvious in this function: memory allocated by ieee80211_beacon_get() is never released. Fixing this leak makes kmemleak happy.

AI-Powered Analysis

AILast updated: 06/29/2025, 19:57:38 UTC

Technical Analysis

CVE-2024-26896 is a vulnerability identified in the Linux kernel's Wi-Fi driver subsystem, specifically within the wfx driver responsible for managing certain Wi-Fi chipsets. The issue is a memory leak occurring when the system starts an Access Point (AP) mode. The root cause is traced to the function wfx_start_ap(), which calls ieee80211_beacon_get() to allocate memory for beacon frames but fails to release this memory properly, leading to unreferenced objects in kernel memory. This leak was detected by the kernel memory leak detector (kmemleak), which reported unreferenced objects linked to the wpa_supplicant process. The vulnerability is related to improper memory management in the AP start sequence, specifically in the wfx_set_mfp_ap() function, where allocated memory by ieee80211_beacon_get() is never freed. Although the kernel stack traces are somewhat obscured due to build optimizations, the analysis confirms the leak. The vulnerability is categorized under CWE-125 (Out-of-bounds Read), indicating potential memory handling issues. While no known exploits are currently reported in the wild, the flaw could lead to gradual memory exhaustion on affected systems running the vulnerable Linux kernel versions, potentially causing system instability or denial of service. The affected versions are identified by specific kernel commit hashes, indicating this is a recent and targeted fix in the Linux kernel source. No CVSS score is assigned yet, and no patch links are provided in the data, but the issue is publicly disclosed and marked as published as of April 17, 2024.

Potential Impact

For European organizations, the impact of CVE-2024-26896 primarily concerns systems running Linux kernels with the vulnerable wfx Wi-Fi driver, especially those deploying AP mode functionality. This includes enterprise Wi-Fi access points, embedded devices, and network infrastructure relying on Linux-based systems with wfx chipsets. The memory leak can lead to progressive memory consumption, resulting in degraded system performance, instability, or crashes, which could disrupt network availability and connectivity. Such disruptions can affect critical business operations, particularly in sectors relying on continuous wireless network access such as telecommunications, manufacturing, healthcare, and public services. Although the vulnerability does not directly allow remote code execution or privilege escalation, the denial of service through resource exhaustion could be exploited in targeted attacks to degrade network infrastructure reliability. European organizations with large-scale Linux deployments or embedded Linux devices in their network infrastructure are at risk of operational impact. The absence of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits over time. The vulnerability's impact on confidentiality and integrity is minimal, but availability impact is moderate to high depending on deployment scale and mitigation status.

Mitigation Recommendations

To mitigate CVE-2024-26896, European organizations should: 1) Identify Linux systems running the wfx Wi-Fi driver and verify kernel versions against the affected commit hashes. 2) Apply the latest Linux kernel updates or patches that address this memory leak as soon as they become available from trusted sources or Linux distributions. 3) For embedded or specialized devices, coordinate with vendors to obtain firmware updates incorporating the fix. 4) Monitor system memory usage on devices running AP mode with wfx drivers to detect abnormal memory growth indicative of leaks. 5) Limit the use of AP mode on vulnerable devices until patched, or consider alternative Wi-Fi drivers or hardware if feasible. 6) Implement robust network monitoring and alerting to detect potential denial-of-service conditions caused by resource exhaustion. 7) Maintain an inventory of Linux-based network devices and ensure timely patch management processes are in place. 8) Engage with Linux community or vendor security advisories regularly to track updates related to this CVE. These steps go beyond generic advice by focusing on driver-specific identification, proactive monitoring, and vendor coordination for embedded systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.186Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3e8d

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:57:38 PM

Last updated: 8/3/2025, 12:56:13 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats