CVE-2024-56599

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's ath10k SDIO driver can cause kernel panic during module removal when CONFIG_INIT_ON_FREE_DEFAULT_ON is enabled. This affects Linux systems using Qualcomm Atheros QCA6174 WiFi chips via SDIO interface. The vulnerability is triggered during driver cleanup when removing the ath10k module.

💻 Affected Systems

Products:
  • Linux kernel ath10k SDIO driver
Versions: Linux kernel versions with vulnerable ath10k SDIO implementation before fixes in stable releases
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when CONFIG_INIT_ON_FREE_DEFAULT_ON=y is set in kernel configuration. Tested on QCA6174 hw3.2 SDIO chips.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, requiring physical or remote reboot.

🟠

Likely Case

System crash during driver removal operations, causing temporary service disruption.

🟢

If Mitigated

No impact if CONFIG_INIT_ON_FREE_DEFAULT_ON is disabled or patched kernel is used.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger driver removal.
🏢 Internal Only: MEDIUM - Local users or automated processes removing the driver can crash the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to remove ath10k module (typically root privileges) and specific kernel configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel stable releases containing commits 27d5d217ae7ffb99dd623375a17a7d3418d9c755 and related fixes

Vendor Advisory: https://git.kernel.org/stable/c/27d5d217ae7ffb99dd623375a17a7d3418d9c755

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Rebuild kernel if using custom build. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable CONFIG_INIT_ON_FREE_DEFAULT_ON

linux

Disable kernel configuration option that triggers the NULL pointer dereference

Rebuild kernel with CONFIG_INIT_ON_FREE_DEFAULT_ON=n

Avoid ath10k module removal

linux

Prevent removal of ath10k module during normal operations

echo 'install ath10k /bin/false' >> /etc/modprobe.d/ath10k.conf

🧯 If You Can't Patch

  • Ensure CONFIG_INIT_ON_FREE_DEFAULT_ON is disabled in kernel configuration
  • Restrict module removal permissions to prevent unauthorized users from triggering the vulnerability

🔍 How to Verify

Check if Vulnerable:

Check kernel config: grep CONFIG_INIT_ON_FREE_DEFAULT_ON /boot/config-$(uname -r) and verify ath10k module version

Check Version:

modinfo ath10k | grep version && uname -r

Verify Fix Applied:

Check kernel version is patched: uname -r and verify with distribution security advisories

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg output
  • NULL pointer dereference errors during module removal

Network Indicators:

  • Sudden loss of WiFi connectivity followed by system instability

SIEM Query:

source="kernel" AND ("NULL pointer" OR "kernel panic") AND "ath10k"

🔗 References

📤 Share & Export