CVE-2024-40911
📋 TL;DR
A race condition vulnerability in the Linux kernel's WiFi subsystem allows a NULL pointer dereference when accessing wireless station statistics. This affects Linux systems using specific WiFi drivers (particularly ath10k) and can cause kernel panics or system crashes. The vulnerability requires local access or ability to trigger specific WiFi operations.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.
Likely Case
System crash or kernel panic when WiFi station disconnects/reconnects rapidly while statistics are being queried.
If Mitigated
No impact if patched; otherwise, potential system instability during WiFi operations.
🎯 Exploit Status
Exploitation requires triggering specific race condition during WiFi station operations; not trivial but possible for local attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 0ccc63958d8373e15a69f4f8069f3e78f7f3898a, 43e1eefb0b2094e2281150d87d09e8bc872b9fba, 642f89daa34567d02f312d03e41523a894906dae, 6d540b0317901535275020bd4ac44fac6439ca76, dfd84ce41663be9ca3f69bd657c45f49b69344d9
Vendor Advisory: https://git.kernel.org/stable/c/0ccc63958d8373e15a69f4f8069f3e78f7f3898a
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable WiFi
linuxDisable WiFi functionality to prevent triggering the vulnerability
sudo nmcli radio wifi off
sudo ip link set wlan0 down
Blacklist ath10k driver
linuxPrevent loading of vulnerable WiFi driver
echo 'blacklist ath10k_pci' | sudo tee /etc/modprobe.d/blacklist-ath10k.conf
sudo update-initramfs -u
🧯 If You Can't Patch
- Disable WiFi functionality entirely on affected systems
- Restrict local user access to prevent triggering the race condition
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if WiFi is active: uname -r && ip link show | grep wlan
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits or is newer than vulnerable versions
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages mentioning ath10k_sta_statistics
- NULL pointer dereference errors in kernel logs
- System crash reports during WiFi operations
Network Indicators:
- Sudden WiFi disconnections followed by system instability
SIEM Query:
source="kernel" AND ("ath10k_sta_statistics" OR "NULL pointer dereference" OR "Oops: 0000000096000006")
🔗 References
- https://git.kernel.org/stable/c/0ccc63958d8373e15a69f4f8069f3e78f7f3898a
- https://git.kernel.org/stable/c/43e1eefb0b2094e2281150d87d09e8bc872b9fba
- https://git.kernel.org/stable/c/642f89daa34567d02f312d03e41523a894906dae
- https://git.kernel.org/stable/c/6d540b0317901535275020bd4ac44fac6439ca76
- https://git.kernel.org/stable/c/dfd84ce41663be9ca3f69bd657c45f49b69344d9
- https://git.kernel.org/stable/c/0ccc63958d8373e15a69f4f8069f3e78f7f3898a
- https://git.kernel.org/stable/c/43e1eefb0b2094e2281150d87d09e8bc872b9fba
- https://git.kernel.org/stable/c/642f89daa34567d02f312d03e41523a894906dae
- https://git.kernel.org/stable/c/6d540b0317901535275020bd4ac44fac6439ca76
- https://git.kernel.org/stable/c/dfd84ce41663be9ca3f69bd657c45f49b69344d9
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html