CVE-2024-47715

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
24/10/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mt76: mt7915: fix oops on non-dbdc mt7986<br /> <br /> mt7915_band_config() sets band_idx = 1 on the main phy for mt7986<br /> with MT7975_ONE_ADIE or MT7976_ONE_ADIE.<br /> <br /> Commit 0335c034e726 ("wifi: mt76: fix race condition related to<br /> checking tx queue fill status") introduced a dereference of the<br /> phys array indirectly indexed by band_idx via wcid-&gt;phy_idx in<br /> mt76_wcid_cleanup(). This caused the following Oops on affected<br /> mt7986 devices:<br /> <br /> Unable to handle kernel read from unreadable memory at virtual address 0000000000000024<br /> Mem abort info:<br /> ESR = 0x0000000096000005<br /> EC = 0x25: DABT (current EL), IL = 32 bits<br /> SET = 0, FnV = 0<br /> EA = 0, S1PTW = 0<br /> FSC = 0x05: level 1 translation fault<br /> Data abort info:<br /> ISV = 0, ISS = 0x00000005<br /> CM = 0, WnR = 0<br /> user pgtable: 4k pages, 39-bit VAs, pgdp=0000000042545000<br /> [0000000000000024] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000<br /> Internal error: Oops: 0000000096000005 [#1] SMP<br /> Modules linked in: ... mt7915e mt76_connac_lib mt76 mac80211 cfg80211 ...<br /> CPU: 2 PID: 1631 Comm: hostapd Not tainted 5.15.150 #0<br /> Hardware name: ZyXEL EX5700 (Telenor) (DT)<br /> pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> pc : mt76_wcid_cleanup+0x84/0x22c [mt76]<br /> lr : mt76_wcid_cleanup+0x64/0x22c [mt76]<br /> sp : ffffffc00a803700<br /> x29: ffffffc00a803700 x28: ffffff80008f7300 x27: ffffff80003f3c00<br /> x26: ffffff80000a7880 x25: ffffffc008c26e00 x24: 0000000000000001<br /> x23: ffffffc000a68114 x22: 0000000000000000 x21: ffffff8004172cc8<br /> x20: ffffffc00a803748 x19: ffffff8004152020 x18: 0000000000000000<br /> x17: 00000000000017c0 x16: ffffffc008ef5000 x15: 0000000000000be0<br /> x14: ffffff8004172e28 x13: ffffff8004172e28 x12: 0000000000000000<br /> x11: 0000000000000000 x10: ffffff8004172e30 x9 : ffffff8004172e28<br /> x8 : 0000000000000000 x7 : ffffff8004156020 x6 : 0000000000000000<br /> x5 : 0000000000000031 x4 : 0000000000000000 x3 : 0000000000000001<br /> x2 : 0000000000000000 x1 : ffffff80008f7300 x0 : 0000000000000024<br /> Call trace:<br /> mt76_wcid_cleanup+0x84/0x22c [mt76]<br /> __mt76_sta_remove+0x70/0xbc [mt76]<br /> mt76_sta_state+0x8c/0x1a4 [mt76]<br /> mt7915_eeprom_get_power_delta+0x11e4/0x23a0 [mt7915e]<br /> drv_sta_state+0x144/0x274 [mac80211]<br /> sta_info_move_state+0x1cc/0x2a4 [mac80211]<br /> sta_set_sinfo+0xaf8/0xc24 [mac80211]<br /> sta_info_destroy_addr_bss+0x4c/0x6c [mac80211]<br /> <br /> ieee80211_color_change_finish+0x1c08/0x1e70 [mac80211]<br /> cfg80211_check_station_change+0x1360/0x4710 [cfg80211]<br /> genl_family_rcv_msg_doit+0xb4/0x110<br /> genl_rcv_msg+0xd0/0x1bc<br /> netlink_rcv_skb+0x58/0x120<br /> genl_rcv+0x34/0x50<br /> netlink_unicast+0x1f0/0x2ec<br /> netlink_sendmsg+0x198/0x3d0<br /> ____sys_sendmsg+0x1b0/0x210<br /> ___sys_sendmsg+0x80/0xf0<br /> __sys_sendmsg+0x44/0xa0<br /> __arm64_sys_sendmsg+0x20/0x30<br /> invoke_syscall.constprop.0+0x4c/0xe0<br /> do_el0_svc+0x40/0xd0<br /> el0_svc+0x14/0x4c<br /> el0t_64_sync_handler+0x100/0x110<br /> el0t_64_sync+0x15c/0x160<br /> Code: d2800002 910092c0 52800023 f9800011 (885f7c01)<br /> ---[ end trace 7e42dd9a39ed2281 ]---<br /> <br /> Fix by using mt76_dev_phy() which will map band_idx to the correct phy<br /> for all hardware combinations.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.48 (including) 6.6.54 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.13 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.2 (excluding)