Skip to main content

CVE-2024-42125: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-42125cvecve-2024-42125
Published: Tue Jul 30 2024 (07/30/2024, 07:46:22 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband We have some policy via BIOS to block uses of 6 GHz. In this case, 6 GHz sband will be NULL even if it is WiFi 7 chip. So, add NULL handling here to avoid crash.

AI-Powered Analysis

AILast updated: 07/04/2025, 12:12:45 UTC

Technical Analysis

CVE-2024-42125 is a vulnerability identified in the Linux kernel specifically within the Realtek rtw89 WiFi driver firmware handling code. The issue arises when the system BIOS policy disables the use of the 6 GHz frequency band, which is relevant for WiFi 7 capable chips. In such cases, the 6 GHz sub-band (sband) pointer is set to NULL. The vulnerable code did not properly handle this NULL pointer scenario, leading to a potential kernel crash when the scan offload feature attempts to prohibit all 6 GHz channels without verifying the presence of a valid 6 GHz sband. This lack of NULL pointer handling can cause a denial of service (DoS) condition by crashing the kernel, impacting system stability and availability. The vulnerability affects Linux kernel versions identified by the commit hash 4ba24331c973eb1df0d3b67b0e3f8b7cde7765a7. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The fix involves adding proper NULL pointer checks to prevent the kernel from crashing when the 6 GHz sband is unavailable due to BIOS policy restrictions.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of system instability and denial of service on Linux systems utilizing Realtek WiFi 7 chipsets with the rtw89 driver, especially where BIOS policies disable 6 GHz WiFi bands. Organizations relying on Linux servers, workstations, or embedded devices with affected WiFi hardware could experience unexpected kernel crashes, leading to service interruptions or downtime. This could impact critical infrastructure, enterprise networks, or industrial control systems that depend on stable wireless connectivity. Although the vulnerability does not appear to allow privilege escalation or remote code execution, the potential for DoS could disrupt business operations, particularly in environments where high availability is required. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the crash condition.

Mitigation Recommendations

European organizations should promptly apply the Linux kernel patch that addresses this vulnerability by adding NULL pointer handling in the rtw89 WiFi driver firmware code. System administrators should verify that their Linux distributions have incorporated this fix or manually update the kernel to a patched version. Additionally, organizations should audit BIOS configurations to understand policies related to 6 GHz WiFi band usage and consider enabling the 6 GHz band if compatible and secure. Monitoring system logs for kernel crashes related to WiFi scanning can help detect attempts to trigger this vulnerability. For critical systems, implementing redundancy and failover mechanisms can mitigate the impact of potential DoS conditions. Finally, maintaining an up-to-date inventory of devices using Realtek WiFi 7 chipsets and the rtw89 driver will help prioritize patching efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-29T15:50:41.179Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb050

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 12:12:45 PM

Last updated: 8/18/2025, 11:34:44 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats