
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-56607 affects the Linux kernel's WiFi subsystem, specifically the ath12k driver's bitrate mask setting functionality. The vulnerability was discovered and disclosed on December 27, 2024, and affects the ath12kmacopsetbitrate_mask() function in the Linux kernel's wireless networking code (Kernel Commit).
The vulnerability stems from an invalid context error in the ath12kmacopsetbitrate_mask() function when attempting to set bitrates using the command 'iw wlan0 set bitrates legacy-2.4 1'. The issue occurs due to improper atomic calls, where the function attempts to sleep in an invalid context at drivers/net/wireless/ath/ath12k/wmi.c:420. The bug manifests when the system holds three specific locks while attempting operations that cannot be performed in atomic context (Kernel Commit).
The vulnerability can cause system instability when users attempt to manually set WiFi bitrates on affected systems. This particularly affects systems using the ath12k driver, with specific issues noted on the WCN6855 firmware which may crash during these operations (Kernel Commit).
The issue has been fixed by switching to use the recently introduced ieee80211iteratestationsmtx() function instead of the atomic version. The fix involves replacing calls to ieee80211iteratestationsatomic() with ieee80211iteratestations_mtx() (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."