CVE-2024-35845
📋 TL;DR
This CVE-2024-35845 is a buffer overflow vulnerability in the Linux kernel's iwlwifi driver where debug information strings lack proper null termination. Attackers could exploit this to execute arbitrary code or cause denial of service on systems using Intel wireless hardware. All Linux systems with vulnerable iwlwifi driver versions are affected.
💻 Affected Systems
- Linux kernel iwlwifi driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete system compromise, data theft, or persistent backdoor installation.
Likely Case
Kernel panic or system crash causing denial of service, potentially requiring physical reboot.
If Mitigated
Limited impact if exploit attempts are blocked by network segmentation or if vulnerable driver isn't loaded.
🎯 Exploit Status
Exploitation requires wireless network access and knowledge of driver internals. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel with commits 71d4186d470e9cda7cd1a0921b4afda737c6f641 or later
Vendor Advisory: https://git.kernel.org/stable/c/71d4186d470e9cda7cd1a0921b4afda737c6f641
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. For distributions: 'sudo apt update && sudo apt upgrade' (Debian/Ubuntu) or 'sudo yum update kernel' (RHEL/CentOS). 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable iwlwifi driver
linuxTemporarily disable the vulnerable driver if wireless not needed
sudo modprobe -r iwlwifi
echo 'blacklist iwlwifi' | sudo tee /etc/modprobe.d/blacklist-iwlwifi.conf
Disable debug features
linuxDisable debug TLV functionality if not required
echo 'options iwlwifi enable_debug=0' | sudo tee /etc/modprobe.d/iwlwifi-disable-debug.conf
sudo modprobe -r iwlwifi && sudo modprobe iwlwifi
🧯 If You Can't Patch
- Segment wireless networks from critical systems using firewall rules
- Monitor for unusual wireless driver crashes or kernel panics
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if iwlwifi module is loaded: 'uname -r' and 'lsmod | grep iwlwifi'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and check git commit contains fix: 'uname -r' and review kernel changelog
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- iwlwifi driver crashes in dmesg
- System reboots without clear cause
Network Indicators:
- Unusual wireless packet patterns targeting Intel MAC addresses
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "iwlwifi")
🔗 References
- https://git.kernel.org/stable/c/71d4186d470e9cda7cd1a0921b4afda737c6f641
- https://git.kernel.org/stable/c/783d413f332a3ebec916664b366c28f58147f82c
- https://git.kernel.org/stable/c/96aa40761673da045a7774f874487cdb50c6a2f7
- https://git.kernel.org/stable/c/c855a1a5b7e3de57e6b1b29563113d5e3bfdb89a
- https://git.kernel.org/stable/c/ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea
- https://git.kernel.org/stable/c/fabe2db7de32a881e437ee69db32e0de785a6209
- https://git.kernel.org/stable/c/fec14d1cdd92f340b9ba2bd220abf96f9609f2a9
- https://git.kernel.org/stable/c/71d4186d470e9cda7cd1a0921b4afda737c6f641
- https://git.kernel.org/stable/c/783d413f332a3ebec916664b366c28f58147f82c
- https://git.kernel.org/stable/c/96aa40761673da045a7774f874487cdb50c6a2f7
- https://git.kernel.org/stable/c/c855a1a5b7e3de57e6b1b29563113d5e3bfdb89a
- https://git.kernel.org/stable/c/ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea
- https://git.kernel.org/stable/c/fabe2db7de32a881e437ee69db32e0de785a6209
- https://git.kernel.org/stable/c/fec14d1cdd92f340b9ba2bd220abf96f9609f2a9
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html