Skip to main content

CVE-2024-58097: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-58097cvecve-2024-58097
Published: Wed Apr 16 2025 (04/16/2025, 14:11:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix RCU stall while reaping monitor destination ring While processing the monitor destination ring, MSDUs are reaped from the link descriptor based on the corresponding buf_id. However, sometimes the driver cannot obtain a valid buffer corresponding to the buf_id received from the hardware. This causes an infinite loop in the destination processing, resulting in a kernel crash. kernel log: ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309 ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309 ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed Fix this by skipping the problematic buf_id and reaping the next entry, replacing the break with the next MSDU processing. Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30 Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1

AI-Powered Analysis

AILast updated: 07/03/2025, 19:44:07 UTC

Technical Analysis

CVE-2024-58097 is a vulnerability identified in the Linux kernel's ath11k wireless driver, which handles Qualcomm Atheros Wi-Fi chipsets. The flaw arises during the processing of the monitor destination ring, where MSDUs (MAC Service Data Units) are reaped from link descriptors based on buffer IDs (buf_id) provided by the hardware. Occasionally, the driver fails to obtain a valid buffer corresponding to a received buf_id, causing an infinite loop in the destination processing logic. This infinite loop leads to a kernel crash, resulting in a denial of service condition. The kernel logs reveal repeated invalid buf_id errors and failures in returning link descriptors, indicating the driver is stuck processing the same invalid entry. The fix implemented involves skipping the problematic buf_id and continuing to process subsequent MSDUs, thereby preventing the infinite loop and stabilizing the driver. The vulnerability affects Linux kernel versions containing the specified commit hashes and has been tested on Qualcomm hardware platforms WCN6855 and QCN9074. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations relying on Linux-based systems with Qualcomm Atheros ath11k wireless chipsets, this vulnerability could lead to unexpected kernel crashes and system instability. This is particularly critical for infrastructure that depends on continuous wireless connectivity, such as enterprise Wi-Fi access points, embedded devices, and industrial control systems using Linux. The denial of service caused by kernel crashes could disrupt business operations, degrade network availability, and potentially impact critical services relying on wireless communication. Although the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be exploited in targeted denial of service attacks. Organizations with large-scale deployments of affected hardware or those in sectors requiring high availability (e.g., telecommunications, manufacturing, healthcare) may face operational risks until patched.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2024-58097. Specifically, they should ensure that their Linux distributions have incorporated the fix that skips invalid buf_id entries during MSDU processing in the ath11k driver. Network administrators should audit their environments to identify devices using Qualcomm Atheros ath11k chipsets, especially those running kernel versions prior to the fix. For embedded and IoT devices where kernel updates may be delayed, consider isolating affected devices on segmented networks to limit potential impact. Monitoring kernel logs for repeated 'invalid buf_id' errors can help detect unpatched systems. Additionally, organizations should engage with hardware vendors and Linux distribution maintainers to confirm patch availability and deployment timelines. Implementing robust wireless network monitoring and fallback mechanisms can help maintain service continuity during patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-03-06T15:52:09.189Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde37a

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 7/3/2025, 7:44:07 PM

Last updated: 8/14/2025, 11:03:42 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats