Skip to main content

CVE-2024-38572: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-38572cvecve-2024-38572
Published: Wed Jun 19 2024 (06/19/2024, 13:35:37 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() Currently, there is no terminator entry for ath12k_qmi_msg_handlers hence facing below KASAN warning, ================================================================== BUG: KASAN: global-out-of-bounds in qmi_invoke_handler+0xa4/0x148 Read of size 8 at addr ffffffd00a6428d8 by task kworker/u8:2/1273 CPU: 0 PID: 1273 Comm: kworker/u8:2 Not tainted 5.4.213 #0 Workqueue: qmi_msg_handler qmi_data_ready_work Call trace: dump_backtrace+0x0/0x20c show_stack+0x14/0x1c dump_stack+0xe0/0x138 print_address_description.isra.5+0x30/0x330 __kasan_report+0x16c/0x1bc kasan_report+0xc/0x14 __asan_load8+0xa8/0xb0 qmi_invoke_handler+0xa4/0x148 qmi_handle_message+0x18c/0x1bc qmi_data_ready_work+0x4ec/0x528 process_one_work+0x2c0/0x440 worker_thread+0x324/0x4b8 kthread+0x210/0x228 ret_from_fork+0x10/0x18 The address belongs to the variable: ath12k_mac_mon_status_filter_default+0x4bd8/0xfffffffffffe2300 [ath12k] [...] ================================================================== Add a dummy terminator entry at the end to assist the qmi_invoke_handler() in traversing up to the terminator entry without accessing an out-of-boundary index. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1

AI-Powered Analysis

AILast updated: 06/29/2025, 11:27:23 UTC

Technical Analysis

CVE-2024-38572 is a vulnerability identified in the Linux kernel specifically affecting the ath12k wireless driver component. The issue arises from an out-of-bounds memory access in the function qmi_invoke_handler(), which is responsible for handling QMI (Qualcomm MSM Interface) messages within the ath12k driver. The root cause is the absence of a terminator entry in the ath12k_qmi_msg_handlers array, which leads the handler function to traverse beyond the valid bounds of the array. This results in a global out-of-bounds read detected by Kernel Address Sanitizer (KASAN), a memory error detector in the Linux kernel. The out-of-bounds read occurs when the handler attempts to access an 8-byte memory region beyond the array limit, potentially leading to undefined behavior, kernel crashes, or memory corruption. The vulnerability was observed on hardware such as QCN9274 hw2.0 PCI WLAN modules. The fix involves adding a dummy terminator entry at the end of the message handler array to prevent the handler from accessing invalid memory locations. While no known exploits are currently reported in the wild, the vulnerability affects Linux kernel versions containing the vulnerable commit (d889913205cf7ebda905b1e62c5867ed4e39f6c2) and impacts systems using the ath12k wireless driver, which is common in devices with Qualcomm Wi-Fi chipsets. The vulnerability does not require user interaction but occurs in kernel space, making it a serious concern for system stability and security.

Potential Impact

For European organizations, the impact of CVE-2024-38572 could be significant, especially for those relying on Linux-based infrastructure with Qualcomm ath12k wireless hardware. The vulnerability could lead to kernel crashes or denial of service conditions, disrupting network connectivity and potentially causing downtime in critical systems. Although there is no evidence of remote code execution or privilege escalation directly from this vulnerability, the out-of-bounds access could be leveraged as part of a more complex attack chain to compromise system integrity. Organizations in sectors such as telecommunications, manufacturing, and critical infrastructure that deploy embedded Linux systems with affected wireless modules may face operational risks. Additionally, the instability caused by this flaw could affect endpoint devices, servers, or network appliances, impacting confidentiality and availability of services. Given the widespread use of Linux in European data centers and embedded systems, unpatched devices could be vulnerable to targeted attacks or accidental crashes, leading to service interruptions and potential data loss.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize applying the official Linux kernel patches that add the dummy terminator entry to the ath12k_qmi_msg_handlers array. Kernel updates should be tested and deployed promptly on all affected systems, especially those using Qualcomm ath12k wireless drivers. Network administrators should audit their hardware inventory to identify devices with vulnerable wireless chipsets and ensure firmware and driver updates are current. For embedded systems or custom Linux distributions, recompiling the kernel with the patched source is necessary. Additionally, organizations should implement kernel hardening techniques such as enabling KASAN and other memory protection mechanisms to detect similar issues proactively. Monitoring kernel logs for KASAN warnings or related anomalies can help identify exploitation attempts or instability. Where possible, isolating critical systems from untrusted networks and enforcing strict access controls can reduce the risk of exploitation. Finally, maintaining an up-to-date asset management database will facilitate rapid response to future vulnerabilities affecting hardware drivers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-18T19:36:34.924Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe29e3

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 11:27:23 AM

Last updated: 8/5/2025, 12:32:28 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats