CVE-2024-47715
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
24/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: mt76: mt7915: fix oops on non-dbdc mt7986<br />
<br />
mt7915_band_config() sets band_idx = 1 on the main phy for mt7986<br />
with MT7975_ONE_ADIE or MT7976_ONE_ADIE.<br />
<br />
Commit 0335c034e726 ("wifi: mt76: fix race condition related to<br />
checking tx queue fill status") introduced a dereference of the<br />
phys array indirectly indexed by band_idx via wcid->phy_idx in<br />
mt76_wcid_cleanup(). This caused the following Oops on affected<br />
mt7986 devices:<br />
<br />
Unable to handle kernel read from unreadable memory at virtual address 0000000000000024<br />
Mem abort info:<br />
ESR = 0x0000000096000005<br />
EC = 0x25: DABT (current EL), IL = 32 bits<br />
SET = 0, FnV = 0<br />
EA = 0, S1PTW = 0<br />
FSC = 0x05: level 1 translation fault<br />
Data abort info:<br />
ISV = 0, ISS = 0x00000005<br />
CM = 0, WnR = 0<br />
user pgtable: 4k pages, 39-bit VAs, pgdp=0000000042545000<br />
[0000000000000024] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000<br />
Internal error: Oops: 0000000096000005 [#1] SMP<br />
Modules linked in: ... mt7915e mt76_connac_lib mt76 mac80211 cfg80211 ...<br />
CPU: 2 PID: 1631 Comm: hostapd Not tainted 5.15.150 #0<br />
Hardware name: ZyXEL EX5700 (Telenor) (DT)<br />
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br />
pc : mt76_wcid_cleanup+0x84/0x22c [mt76]<br />
lr : mt76_wcid_cleanup+0x64/0x22c [mt76]<br />
sp : ffffffc00a803700<br />
x29: ffffffc00a803700 x28: ffffff80008f7300 x27: ffffff80003f3c00<br />
x26: ffffff80000a7880 x25: ffffffc008c26e00 x24: 0000000000000001<br />
x23: ffffffc000a68114 x22: 0000000000000000 x21: ffffff8004172cc8<br />
x20: ffffffc00a803748 x19: ffffff8004152020 x18: 0000000000000000<br />
x17: 00000000000017c0 x16: ffffffc008ef5000 x15: 0000000000000be0<br />
x14: ffffff8004172e28 x13: ffffff8004172e28 x12: 0000000000000000<br />
x11: 0000000000000000 x10: ffffff8004172e30 x9 : ffffff8004172e28<br />
x8 : 0000000000000000 x7 : ffffff8004156020 x6 : 0000000000000000<br />
x5 : 0000000000000031 x4 : 0000000000000000 x3 : 0000000000000001<br />
x2 : 0000000000000000 x1 : ffffff80008f7300 x0 : 0000000000000024<br />
Call trace:<br />
mt76_wcid_cleanup+0x84/0x22c [mt76]<br />
__mt76_sta_remove+0x70/0xbc [mt76]<br />
mt76_sta_state+0x8c/0x1a4 [mt76]<br />
mt7915_eeprom_get_power_delta+0x11e4/0x23a0 [mt7915e]<br />
drv_sta_state+0x144/0x274 [mac80211]<br />
sta_info_move_state+0x1cc/0x2a4 [mac80211]<br />
sta_set_sinfo+0xaf8/0xc24 [mac80211]<br />
sta_info_destroy_addr_bss+0x4c/0x6c [mac80211]<br />
<br />
ieee80211_color_change_finish+0x1c08/0x1e70 [mac80211]<br />
cfg80211_check_station_change+0x1360/0x4710 [cfg80211]<br />
genl_family_rcv_msg_doit+0xb4/0x110<br />
genl_rcv_msg+0xd0/0x1bc<br />
netlink_rcv_skb+0x58/0x120<br />
genl_rcv+0x34/0x50<br />
netlink_unicast+0x1f0/0x2ec<br />
netlink_sendmsg+0x198/0x3d0<br />
____sys_sendmsg+0x1b0/0x210<br />
___sys_sendmsg+0x80/0xf0<br />
__sys_sendmsg+0x44/0xa0<br />
__arm64_sys_sendmsg+0x20/0x30<br />
invoke_syscall.constprop.0+0x4c/0xe0<br />
do_el0_svc+0x40/0xd0<br />
el0_svc+0x14/0x4c<br />
el0t_64_sync_handler+0x100/0x110<br />
el0t_64_sync+0x15c/0x160<br />
Code: d2800002 910092c0 52800023 f9800011 (885f7c01)<br />
---[ end trace 7e42dd9a39ed2281 ]---<br />
<br />
Fix by using mt76_dev_phy() which will map band_idx to the correct phy<br />
for all hardware combinations.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.48 (including) | 6.6.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



