CVE-2024-58015

7.1 HIGH

📋 TL;DR

This vulnerability in the Linux kernel's ath12k WiFi driver allows an attacker to cause out-of-bounds memory access by exploiting a buffer size calculation error. It affects systems running vulnerable Linux kernel versions with the ath12k driver enabled. The vulnerability could lead to system crashes or potential privilege escalation.

💻 Affected Systems

Products:
  • Linux kernel with ath12k driver
Versions: Linux kernel versions before the fix commits (specific versions depend on distribution backports)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the ath12k WiFi driver for Qualcomm WiFi 7 chipsets. Requires driver to be loaded and active.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or potential privilege escalation leading to full system compromise.

🟠

Likely Case

System instability, crashes, or denial of service affecting WiFi functionality.

🟢

If Mitigated

Limited impact with proper kernel hardening and isolation mechanisms in place.

🌐 Internet-Facing: LOW - Requires local access or WiFi proximity; not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Local attackers or malicious WiFi clients could potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access or ability to interact with WiFi subsystem. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 8700c4bf8b7ed98037d2acf1eaf770ad6dd431d4 and eb8c0534713865d190856f10bfc97cf0b88475b1

Vendor Advisory: https://git.kernel.org/stable/c/8700c4bf8b7ed98037d2acf1eaf770ad6dd431d4

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. Rebuild kernel if using custom kernel. 4. No reboot required for live kernel updates if supported.

🔧 Temporary Workarounds

Disable ath12k driver

all

Unload the vulnerable ath12k driver module if not needed

sudo modprobe -r ath12k

Blacklist ath12k module

all

Prevent ath12k driver from loading at boot

echo 'blacklist ath12k' | sudo tee /etc/modprobe.d/ath12k-blacklist.conf

🧯 If You Can't Patch

  • Restrict physical and network access to systems with vulnerable driver
  • Implement strict WiFi client authentication and monitoring

🔍 How to Verify

Check if Vulnerable:

Check if ath12k module is loaded: lsmod | grep ath12k AND check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: grep -q '8700c4bf8b7ed98037d2acf1eaf770ad6dd431d4\|eb8c0534713865d190856f10bfc97cf0b88475b1' /proc/version

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes related to ath12k
  • WiFi driver errors in dmesg

Network Indicators:

  • Unexpected WiFi disconnections
  • Abnormal WiFi interface behavior

SIEM Query:

source="kernel" AND ("ath12k" OR "out of bounds" OR "general protection fault")

🔗 References

📤 Share & Export