Skip to main content

CVE-2024-56543: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-56543cvecve-2024-56543
Published: Fri Dec 27 2024 (12/27/2024, 14:11:24 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Skip Rx TID cleanup for self peer During peer create, dp setup for the peer is done where Rx TID is updated for all the TIDs. Peer object for self peer will not go through dp setup. When core halts, dp cleanup is done for all the peers. While cleanup, rx_tid::ab is accessed which causes below stack trace for self peer. WARNING: CPU: 6 PID: 12297 at drivers/net/wireless/ath/ath12k/dp_rx.c:851 Call Trace: __warn+0x7b/0x1a0 ath12k_dp_rx_frags_cleanup+0xd2/0xe0 [ath12k] report_bug+0x10b/0x200 handle_bug+0x3f/0x70 exc_invalid_op+0x13/0x60 asm_exc_invalid_op+0x16/0x20 ath12k_dp_rx_frags_cleanup+0xd2/0xe0 [ath12k] ath12k_dp_rx_frags_cleanup+0xca/0xe0 [ath12k] ath12k_dp_rx_peer_tid_cleanup+0x39/0xa0 [ath12k] ath12k_mac_peer_cleanup_all+0x61/0x100 [ath12k] ath12k_core_halt+0x3b/0x100 [ath12k] ath12k_core_reset+0x494/0x4c0 [ath12k] sta object in peer will be updated when remote peer is created. Hence use peer::sta to detect the self peer and skip the cleanup. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1 Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3

AI-Powered Analysis

AILast updated: 06/28/2025, 11:40:00 UTC

Technical Analysis

CVE-2024-56543 is a vulnerability identified in the Linux kernel's ath12k wireless driver, which is responsible for managing Qualcomm Atheros Wi-Fi chipsets. The flaw arises during the cleanup process of receive traffic identifiers (Rx TIDs) associated with wireless peers. Specifically, when the core halts, the driver performs a cleanup of all peers' Rx TIDs. However, the self peer (the local device itself) does not undergo the usual data path (dp) setup during peer creation, leading to an invalid access of the rx_tid::ab field during cleanup. This results in a kernel warning and a stack trace indicating an invalid operation exception. The root cause is that the cleanup code does not properly skip the self peer, causing it to access uninitialized or invalid memory structures. The vulnerability was observed and tested on Qualcomm chipsets QCN9274 and WCN7850. The fix involves detecting the self peer using the peer::sta object and skipping the Rx TID cleanup for it, preventing the invalid memory access and associated kernel crash. Although no known exploits are reported in the wild, the issue can cause system instability or denial of service due to kernel crashes triggered by malformed or unexpected wireless peer states. This vulnerability affects Linux kernel versions containing the specified commit hashes prior to the patch and is relevant to systems using the ath12k driver for Qualcomm Atheros Wi-Fi hardware.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux with Qualcomm Atheros Wi-Fi chipsets managed by the ath12k driver. The impact includes potential denial of service conditions caused by kernel panics or crashes when the wireless driver mishandles self peer cleanup. This can disrupt network connectivity, leading to loss of productivity, interruption of critical services, and potential cascading failures in network-dependent applications. In environments such as enterprises, research institutions, and public sector organizations where Linux-based systems are prevalent, especially those relying on wireless connectivity, this could degrade operational stability. Additionally, embedded Linux devices or IoT infrastructure using affected chipsets may experience similar disruptions. While no direct remote code execution or privilege escalation is indicated, the denial of service impact on availability is significant, particularly for mission-critical systems. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential exploitation or accidental triggering in complex network environments.

Mitigation Recommendations

To mitigate CVE-2024-56543, organizations should: 1) Apply the latest Linux kernel updates that include the patch for this vulnerability, ensuring the ath12k driver is updated to the fixed version. 2) Identify and inventory all Linux systems using Qualcomm Atheros Wi-Fi chipsets with the ath12k driver, prioritizing those in critical network roles. 3) For embedded or IoT devices where kernel updates may be delayed, consider network segmentation or disabling affected wireless interfaces if feasible to reduce exposure. 4) Monitor system logs for kernel warnings or crashes related to ath12k, which may indicate attempted exploitation or instability. 5) Engage with hardware and distribution vendors to confirm patch availability and deployment timelines. 6) Implement robust backup and recovery procedures to minimize downtime in case of service disruption. 7) Consider temporary mitigation by disabling wireless interfaces or switching to alternative drivers if supported until patches are applied. These steps go beyond generic advice by focusing on chipset-specific driver updates, proactive system inventory, and operational continuity planning.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-27T14:03:05.988Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdf1a5

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 11:40:00 AM

Last updated: 8/12/2025, 7:38:43 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats