CVE-2024-35937
📋 TL;DR
This CVE describes an out-of-bounds read vulnerability in the Linux kernel's WiFi subsystem (cfg80211) when processing A-MSDU frames. Attackers could potentially read kernel memory by sending specially crafted WiFi packets. All Linux systems using affected kernel versions with WiFi enabled are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory disclosure leading to information leakage, potential privilege escalation, or system crash.
Likely Case
Information disclosure of kernel memory contents, potentially revealing sensitive data or system state.
If Mitigated
Minimal impact if WiFi is disabled or proper network segmentation prevents malicious packet injection.
🎯 Exploit Status
Exploitation requires WiFi network access and ability to send crafted A-MSDU frames. No public exploit code known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel trees via provided git commits
Vendor Advisory: https://git.kernel.org/stable/c/16da1e1dac23be45ef6e23c41b1508c400e6c544
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable WiFi interfaces
linuxDisable WiFi network interfaces to prevent exploitation
sudo ip link set wlan0 down
sudo nmcli radio wifi off
Network segmentation
allIsolate WiFi networks from sensitive systems
🧯 If You Can't Patch
- Disable WiFi on critical systems
- Implement strict network access controls for WiFi networks
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with distribution's security advisories. Systems with WiFi enabled and unpatched kernels are vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version matches patched version from vendor advisory and WiFi functionality works normally.
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- WiFi subsystem errors in dmesg
- Network interface errors
Network Indicators:
- Unusual A-MSDU frame patterns
- Malformed WiFi packets
SIEM Query:
source="kernel" AND ("cfg80211" OR "A-MSDU" OR "out of bounds")
🔗 References
- https://git.kernel.org/stable/c/16da1e1dac23be45ef6e23c41b1508c400e6c544
- https://git.kernel.org/stable/c/5d7a8585fbb31e88fb2a0f581b70667d3300d1e9
- https://git.kernel.org/stable/c/9ad7974856926129f190ffbe3beea78460b3b7cc
- https://git.kernel.org/stable/c/9eb3bc0973d084423a6df21cf2c74692ff05647e
- https://git.kernel.org/stable/c/16da1e1dac23be45ef6e23c41b1508c400e6c544
- https://git.kernel.org/stable/c/5d7a8585fbb31e88fb2a0f581b70667d3300d1e9
- https://git.kernel.org/stable/c/9ad7974856926129f190ffbe3beea78460b3b7cc
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html