CVE-2024-57995: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() In ath12k_mac_assign_vif_to_vdev(), if arvif is created on a different radio, it gets deleted from that radio through a call to ath12k_mac_unassign_link_vif(). This action frees the arvif pointer. Subsequently, there is a check involving arvif, which will result in a read-after-free scenario. Fix this by moving this check after arvif is again assigned via call to ath12k_mac_assign_link_vif(). Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
AI Analysis
Technical Summary
CVE-2024-57995 is a vulnerability identified in the Linux kernel's ath12k wireless driver, which handles Qualcomm Atheros Wi-Fi chipsets. The flaw arises in the function ath12k_mac_assign_vif_to_vdev(), responsible for assigning a virtual interface (vif) to a virtual device (vdev). When a virtual interface (arvif) is created on a different radio, the code deletes it from the previous radio by calling ath12k_mac_unassign_link_vif(), which frees the arvif pointer. However, immediately after this free operation, the code performs a check involving the now-freed arvif pointer, leading to a read-after-free condition. This type of memory error can cause undefined behavior, including kernel crashes (denial of service) or potentially arbitrary code execution if exploited. The fix involves reordering the code so that the check on arvif occurs only after it has been reassigned via ath12k_mac_assign_link_vif(), preventing access to freed memory. The vulnerability was tested on Qualcomm QCN9274 hardware. No CVSS score has been assigned yet, and there are no known exploits in the wild at this time.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernels with Qualcomm Atheros ath12k Wi-Fi chipsets. Exploitation could lead to kernel crashes causing denial of service, disrupting network connectivity and potentially impacting critical infrastructure or business operations relying on wireless communication. In a worst-case scenario, an attacker might leverage the read-after-free flaw to execute arbitrary code with kernel privileges, compromising system confidentiality and integrity. This could allow attackers to bypass security controls, escalate privileges, or establish persistent footholds. Given the widespread use of Linux in enterprise servers, embedded devices, and IoT equipment across Europe, the vulnerability could affect a broad range of sectors including telecommunications, manufacturing, and public services. However, exploitation requires local code execution or access to the wireless interface, limiting remote attack vectors. The absence of known exploits suggests the threat is currently low but warrants proactive patching to prevent future attacks.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to incorporate the patch that fixes CVE-2024-57995. Specifically, kernel maintainers and system administrators should verify that the ath12k driver code includes the corrected logic in ath12k_mac_assign_vif_to_vdev(). For devices where kernel updates are not immediately feasible, consider disabling or restricting the use of affected wireless interfaces to reduce attack surface. Network segmentation and strict access controls on wireless interfaces can mitigate unauthorized local access. Monitoring kernel logs for crashes or anomalies related to the ath12k driver may help detect attempted exploitation. Additionally, organizations should maintain an inventory of devices using Qualcomm Atheros QCN9274 or similar chipsets to assess exposure. Engaging with hardware vendors for firmware updates and security advisories is recommended. Finally, applying standard Linux security best practices such as minimizing privileged user access and employing kernel hardening techniques will reduce overall risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-57995: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() In ath12k_mac_assign_vif_to_vdev(), if arvif is created on a different radio, it gets deleted from that radio through a call to ath12k_mac_unassign_link_vif(). This action frees the arvif pointer. Subsequently, there is a check involving arvif, which will result in a read-after-free scenario. Fix this by moving this check after arvif is again assigned via call to ath12k_mac_assign_link_vif(). Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
AI-Powered Analysis
Technical Analysis
CVE-2024-57995 is a vulnerability identified in the Linux kernel's ath12k wireless driver, which handles Qualcomm Atheros Wi-Fi chipsets. The flaw arises in the function ath12k_mac_assign_vif_to_vdev(), responsible for assigning a virtual interface (vif) to a virtual device (vdev). When a virtual interface (arvif) is created on a different radio, the code deletes it from the previous radio by calling ath12k_mac_unassign_link_vif(), which frees the arvif pointer. However, immediately after this free operation, the code performs a check involving the now-freed arvif pointer, leading to a read-after-free condition. This type of memory error can cause undefined behavior, including kernel crashes (denial of service) or potentially arbitrary code execution if exploited. The fix involves reordering the code so that the check on arvif occurs only after it has been reassigned via ath12k_mac_assign_link_vif(), preventing access to freed memory. The vulnerability was tested on Qualcomm QCN9274 hardware. No CVSS score has been assigned yet, and there are no known exploits in the wild at this time.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernels with Qualcomm Atheros ath12k Wi-Fi chipsets. Exploitation could lead to kernel crashes causing denial of service, disrupting network connectivity and potentially impacting critical infrastructure or business operations relying on wireless communication. In a worst-case scenario, an attacker might leverage the read-after-free flaw to execute arbitrary code with kernel privileges, compromising system confidentiality and integrity. This could allow attackers to bypass security controls, escalate privileges, or establish persistent footholds. Given the widespread use of Linux in enterprise servers, embedded devices, and IoT equipment across Europe, the vulnerability could affect a broad range of sectors including telecommunications, manufacturing, and public services. However, exploitation requires local code execution or access to the wireless interface, limiting remote attack vectors. The absence of known exploits suggests the threat is currently low but warrants proactive patching to prevent future attacks.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to incorporate the patch that fixes CVE-2024-57995. Specifically, kernel maintainers and system administrators should verify that the ath12k driver code includes the corrected logic in ath12k_mac_assign_vif_to_vdev(). For devices where kernel updates are not immediately feasible, consider disabling or restricting the use of affected wireless interfaces to reduce attack surface. Network segmentation and strict access controls on wireless interfaces can mitigate unauthorized local access. Monitoring kernel logs for crashes or anomalies related to the ath12k driver may help detect attempted exploitation. Additionally, organizations should maintain an inventory of devices using Qualcomm Atheros QCN9274 or similar chipsets to assess exposure. Engaging with hardware vendors for firmware updates and security advisories is recommended. Finally, applying standard Linux security best practices such as minimizing privileged user access and employing kernel hardening techniques will reduce overall risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-27T02:04:28.914Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9823c4522896dcbdec2a
Added to database: 5/21/2025, 9:08:51 AM
Last enriched: 6/28/2025, 9:41:43 AM
Last updated: 8/11/2025, 9:52:36 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.