CVE-2024-58097

MEDIUM

Linux Kernel < 6.14.2 - Infinite Loop

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix RCU stall while reaping monitor destination ring While processing the monitor destination ring, MSDUs are reaped from the link descriptor based on the corresponding buf_id. However, sometimes the driver cannot obtain a valid buffer corresponding to the buf_id received from the hardware. This causes an infinite loop in the destination processing, resulting in a kernel crash. kernel log: ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309 ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309 ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed Fix this by skipping the problematic buf_id and reaping the next entry, replacing the break with the next MSDU processing. Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30 Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1

Scores

CVSS v3 5.5
EPSS 0.0005
EPSS Percentile 15.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-835
Status published
Products (14)
linux/Kernel 5.6.0 - 6.6.122linux
linux/Kernel 6.13.0 - 6.14.2linux
linux/Kernel 6.7.0 - 6.12.68linux
Linux/Linux < 5.6
Linux/Linux 5.6
Linux/Linux 6.12.68 - 6.12.*
Linux/Linux 6.14.2 - 6.14.*
Linux/Linux 6.15
Linux/Linux 6.6.122 - 6.6.*
Linux/Linux d5c65159f2895379e11ca13f62feabe93278985d - 16c6c35c03ea73054a1f6d3302a4ce4a331b427d
... and 4 more
Published Apr 16, 2025
Tracked Since Feb 18, 2026