We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47713

wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()



Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() Since '__dev_queue_xmit()' should be called with interrupts enabled, the following backtrace: ieee80211_do_stop() ... spin_lock_irqsave(&local->queue_stop_reason_lock, flags) ... ieee80211_free_txskb() ieee80211_report_used_skb() ieee80211_report_ack_skb() cfg80211_mgmt_tx_status_ext() nl80211_frame_tx_status() genlmsg_multicast_netns() genlmsg_multicast_netns_filtered() nlmsg_multicast_filtered() netlink_broadcast_filtered() do_one_broadcast() netlink_broadcast_deliver() __netlink_sendskb() netlink_deliver_tap() __netlink_deliver_tap_skb() dev_queue_xmit() __dev_queue_xmit() ; with IRQS disabled ... spin_unlock_irqrestore(&local->queue_stop_reason_lock, flags) issues the warning (as reported by syzbot reproducer): WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120 Fix this by implementing a two-phase skb reclamation in 'ieee80211_do_stop()', where actual work is performed outside of a section with interrupts disabled.

Reserved 2024-09-30 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

5061b0c2b9066de426fbc63f1278d2210e789412 before 07eb0bd7b0a8abed9d45e0f567c9af1dc83e5268
affected

5061b0c2b9066de426fbc63f1278d2210e789412 before 04f75f5bae33349283d6886901d9acd2f110c024
affected

5061b0c2b9066de426fbc63f1278d2210e789412 before f232916fab67ca1c3425926df4a866e59ff26908
affected

5061b0c2b9066de426fbc63f1278d2210e789412 before acb53a716e492a02479345157c43f21edc8bc64b
affected

5061b0c2b9066de426fbc63f1278d2210e789412 before db5ca4b42ccfa42d2af7b335ff12578e57775c02
affected

5061b0c2b9066de426fbc63f1278d2210e789412 before 058c9026ad79dc98572442fd4c7e9a36aba6f596
affected

5061b0c2b9066de426fbc63f1278d2210e789412 before eab272972cffff9cd973b8e4055a8e81c64f7e6a
affected

5061b0c2b9066de426fbc63f1278d2210e789412 before ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec
affected

5061b0c2b9066de426fbc63f1278d2210e789412 before 9d301de12da6e1bb069a9835c38359b8e8135121
affected

Default status
affected

2.6.32
affected

Any version before 2.6.32
unaffected

4.19.323
unaffected

5.4.285
unaffected

5.10.227
unaffected

5.15.168
unaffected

6.1.113
unaffected

6.6.54
unaffected

6.10.13
unaffected

6.11.2
unaffected

6.12
unaffected

References

git.kernel.org/...c/07eb0bd7b0a8abed9d45e0f567c9af1dc83e5268

git.kernel.org/...c/04f75f5bae33349283d6886901d9acd2f110c024

git.kernel.org/...c/f232916fab67ca1c3425926df4a866e59ff26908

git.kernel.org/...c/acb53a716e492a02479345157c43f21edc8bc64b

git.kernel.org/...c/db5ca4b42ccfa42d2af7b335ff12578e57775c02

git.kernel.org/...c/058c9026ad79dc98572442fd4c7e9a36aba6f596

git.kernel.org/...c/eab272972cffff9cd973b8e4055a8e81c64f7e6a

git.kernel.org/...c/ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec

git.kernel.org/...c/9d301de12da6e1bb069a9835c38359b8e8135121

cve.org (CVE-2024-47713)

nvd.nist.gov (CVE-2024-47713)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-47713

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.