Skip to main content

CVE-2024-58096: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-58096cvecve-2024-58096
Published: Wed Apr 16 2025 (04/16/2025, 14:11:44 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode ath11k_hal_srng_* should be used with srng->lock to protect srng data. For ath11k_dp_rx_mon_dest_process() and ath11k_dp_full_mon_process_rx(), they use ath11k_hal_srng_* for many times but never call srng->lock. So when running (full) monitor mode, warning will occur: RIP: 0010:ath11k_hal_srng_dst_peek+0x18/0x30 [ath11k] Call Trace: ? ath11k_hal_srng_dst_peek+0x18/0x30 [ath11k] ath11k_dp_rx_process_mon_status+0xc45/0x1190 [ath11k] ? idr_alloc_u32+0x97/0xd0 ath11k_dp_rx_process_mon_rings+0x32a/0x550 [ath11k] ath11k_dp_service_srng+0x289/0x5a0 [ath11k] ath11k_pcic_ext_grp_napi_poll+0x30/0xd0 [ath11k] __napi_poll+0x30/0x1f0 net_rx_action+0x198/0x320 __do_softirq+0xdd/0x319 So add srng->lock for them to avoid such warnings. Inorder to fetch the srng->lock, should change srng's definition from 'void' to 'struct hal_srng'. And initialize them elsewhere to prevent one line of code from being too long. This is consistent with other ring process functions, such as ath11k_dp_process_rx(). Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30 Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1

AI-Powered Analysis

AILast updated: 07/03/2025, 19:43:49 UTC

Technical Analysis

CVE-2024-58096 is a vulnerability identified in the Linux kernel's ath11k wireless driver, specifically affecting the handling of the ath11k_hal_srng_* functions in monitor mode. The ath11k driver supports Qualcomm Atheros Wi-Fi chipsets, and the vulnerability arises because the code uses ath11k_hal_srng_* functions multiple times without properly acquiring the srng->lock mutex to protect shared ring buffer (srng) data structures. This lack of locking can lead to race conditions and data corruption when the driver operates in full monitor mode, which is used for capturing all Wi-Fi traffic for analysis or debugging. The vulnerability manifests as kernel warnings and potentially unstable behavior, as indicated by the call trace involving functions like ath11k_hal_srng_dst_peek and ath11k_dp_rx_process_mon_status. The fix involves adding proper locking (srng->lock) around these critical sections and changing the srng data structure definition to ensure consistent and safe access. The patch has been tested on specific Qualcomm chipsets (WCN6855 hw2.0 and QCN9074 hw1.0) with PCI WLAN interfaces. Although no known exploits are reported in the wild, the flaw could lead to kernel instability or crashes under certain conditions when monitor mode is enabled. Since the vulnerability affects a core kernel driver responsible for wireless communication, it could have broader implications for system reliability and security if exploited or triggered unintentionally.

Potential Impact

For European organizations, the impact of CVE-2024-58096 primarily concerns systems running Linux kernels with affected versions of the ath11k driver and using Qualcomm Atheros Wi-Fi chipsets in monitor mode. This mode is often employed by security researchers, network administrators, and organizations performing wireless traffic analysis or intrusion detection. The vulnerability could cause kernel warnings, instability, or crashes, potentially disrupting critical network monitoring operations. In environments where wireless monitoring is essential for security compliance, incident response, or network troubleshooting, such disruptions could delay detection of real threats or degrade network visibility. Additionally, if attackers find ways to exploit the race condition or data corruption, they might cause denial of service or potentially escalate privileges by destabilizing kernel memory. Given the widespread use of Linux in enterprise servers, embedded devices, and IoT systems across Europe, any instability in wireless drivers could affect operational continuity, especially in sectors relying on wireless connectivity for critical functions such as manufacturing, healthcare, and telecommunications.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Apply the official Linux kernel patches that add the necessary srng->lock protections in the ath11k driver as soon as they become available from trusted Linux distributions or kernel maintainers. 2) Avoid running wireless interfaces in full monitor mode on affected hardware unless absolutely necessary, as this mode triggers the vulnerable code paths. 3) For systems requiring monitor mode, consider using alternative hardware or drivers not affected by this issue until patches are applied. 4) Implement rigorous kernel update policies to ensure timely deployment of security fixes, especially for devices with Qualcomm Atheros chipsets. 5) Monitor kernel logs for warnings related to ath11k_hal_srng_dst_peek or other ath11k driver messages that could indicate attempts to trigger the vulnerability or instability. 6) In environments with high security requirements, conduct thorough testing of wireless drivers after patching to confirm stability and functionality. 7) Collaborate with hardware vendors and Linux distribution maintainers to verify that the patched drivers are included in upcoming releases and backported to long-term support kernels where applicable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-03-06T15:52:09.189Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde376

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 7/3/2025, 7:43:49 PM

Last updated: 8/14/2025, 7:08:32 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats