Read-After-Free Vulnerability in Linux Kernel's ath12k WLAN Driver
CVE-2024-57995

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
27 February 2025

Summary

A read-after-free vulnerability exists in the ath12k WLAN driver within the Linux kernel. This issue arises when an arbitrary virtual interface (arvif) is assigned to a different radio and subsequently gets deleted. During the deletion, the arvif pointer is freed, leading to a situation where a check involving the arvif pointer can result in accessing invalid memory. The issue has been resolved by adjusting the order of operations to ensure that the pointer check occurs after it is properly reassigned, thus eliminating the risk of unintended memory access.

Affected Version(s)

Linux b5068bc9180d06a5ac242b0f9263047c14f86211

Linux b5068bc9180d06a5ac242b0f9263047c14f86211 < 5a10971c7645a95f5d5dc23c26fbac4bf61801d0

Linux 6.10

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.