Skip to main content

CVE-2024-57995: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-57995cvecve-2024-57995
Published: Thu Feb 27 2025 (02/27/2025, 02:07:16 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() In ath12k_mac_assign_vif_to_vdev(), if arvif is created on a different radio, it gets deleted from that radio through a call to ath12k_mac_unassign_link_vif(). This action frees the arvif pointer. Subsequently, there is a check involving arvif, which will result in a read-after-free scenario. Fix this by moving this check after arvif is again assigned via call to ath12k_mac_assign_link_vif(). Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1

AI-Powered Analysis

AILast updated: 06/28/2025, 09:41:43 UTC

Technical Analysis

CVE-2024-57995 is a vulnerability identified in the Linux kernel's ath12k wireless driver, which handles Qualcomm Atheros Wi-Fi chipsets. The flaw arises in the function ath12k_mac_assign_vif_to_vdev(), responsible for assigning a virtual interface (vif) to a virtual device (vdev). When a virtual interface (arvif) is created on a different radio, the code deletes it from the previous radio by calling ath12k_mac_unassign_link_vif(), which frees the arvif pointer. However, immediately after this free operation, the code performs a check involving the now-freed arvif pointer, leading to a read-after-free condition. This type of memory error can cause undefined behavior, including kernel crashes (denial of service) or potentially arbitrary code execution if exploited. The fix involves reordering the code so that the check on arvif occurs only after it has been reassigned via ath12k_mac_assign_link_vif(), preventing access to freed memory. The vulnerability was tested on Qualcomm QCN9274 hardware. No CVSS score has been assigned yet, and there are no known exploits in the wild at this time.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernels with Qualcomm Atheros ath12k Wi-Fi chipsets. Exploitation could lead to kernel crashes causing denial of service, disrupting network connectivity and potentially impacting critical infrastructure or business operations relying on wireless communication. In a worst-case scenario, an attacker might leverage the read-after-free flaw to execute arbitrary code with kernel privileges, compromising system confidentiality and integrity. This could allow attackers to bypass security controls, escalate privileges, or establish persistent footholds. Given the widespread use of Linux in enterprise servers, embedded devices, and IoT equipment across Europe, the vulnerability could affect a broad range of sectors including telecommunications, manufacturing, and public services. However, exploitation requires local code execution or access to the wireless interface, limiting remote attack vectors. The absence of known exploits suggests the threat is currently low but warrants proactive patching to prevent future attacks.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel versions to incorporate the patch that fixes CVE-2024-57995. Specifically, kernel maintainers and system administrators should verify that the ath12k driver code includes the corrected logic in ath12k_mac_assign_vif_to_vdev(). For devices where kernel updates are not immediately feasible, consider disabling or restricting the use of affected wireless interfaces to reduce attack surface. Network segmentation and strict access controls on wireless interfaces can mitigate unauthorized local access. Monitoring kernel logs for crashes or anomalies related to the ath12k driver may help detect attempted exploitation. Additionally, organizations should maintain an inventory of devices using Qualcomm Atheros QCN9274 or similar chipsets to assess exposure. Engaging with hardware vendors for firmware updates and security advisories is recommended. Finally, applying standard Linux security best practices such as minimizing privileged user access and employing kernel hardening techniques will reduce overall risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-27T02:04:28.914Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdec2a

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 9:41:43 AM

Last updated: 8/11/2025, 9:52:36 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats