We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47713

wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()



AssignerLinux
Reserved2024-09-30
Published2024-10-21
Updated2024-11-05

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() Since '__dev_queue_xmit()' should be called with interrupts enabled, the following backtrace: ieee80211_do_stop() ... spin_lock_irqsave(&local->queue_stop_reason_lock, flags) ... ieee80211_free_txskb() ieee80211_report_used_skb() ieee80211_report_ack_skb() cfg80211_mgmt_tx_status_ext() nl80211_frame_tx_status() genlmsg_multicast_netns() genlmsg_multicast_netns_filtered() nlmsg_multicast_filtered() netlink_broadcast_filtered() do_one_broadcast() netlink_broadcast_deliver() __netlink_sendskb() netlink_deliver_tap() __netlink_deliver_tap_skb() dev_queue_xmit() __dev_queue_xmit() ; with IRQS disabled ... spin_unlock_irqrestore(&local->queue_stop_reason_lock, flags) issues the warning (as reported by syzbot reproducer): WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120 Fix this by implementing a two-phase skb reclamation in 'ieee80211_do_stop()', where actual work is performed outside of a section with interrupts disabled.

Product status

Default status
unaffected

5061b0c2b906 before f232916fab67
affected

5061b0c2b906 before acb53a716e49
affected

5061b0c2b906 before db5ca4b42ccf
affected

5061b0c2b906 before 058c9026ad79
affected

5061b0c2b906 before eab272972cff
affected

5061b0c2b906 before ad4b7068b101
affected

5061b0c2b906 before 9d301de12da6
affected

Default status
affected

2.6.32
affected

Any version before 2.6.32
unaffected

5.10.227
unaffected

5.15.168
unaffected

6.1.113
unaffected

6.6.54
unaffected

6.10.13
unaffected

6.11.2
unaffected

6.12-rc1
unaffected

References

https://git.kernel.org/stable/c/f232916fab67ca1c3425926df4a866e59ff26908

https://git.kernel.org/stable/c/acb53a716e492a02479345157c43f21edc8bc64b

https://git.kernel.org/stable/c/db5ca4b42ccfa42d2af7b335ff12578e57775c02

https://git.kernel.org/stable/c/058c9026ad79dc98572442fd4c7e9a36aba6f596

https://git.kernel.org/stable/c/eab272972cffff9cd973b8e4055a8e81c64f7e6a

https://git.kernel.org/stable/c/ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec

https://git.kernel.org/stable/c/9d301de12da6e1bb069a9835c38359b8e8135121

cve.org CVE-2024-47713

nvd.nist.gov CVE-2024-47713

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.