CVE-2024-47713
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()<br />
<br />
Since &#39;__dev_queue_xmit()&#39; should be called with interrupts enabled,<br />
the following backtrace:<br />
<br />
ieee80211_do_stop()<br />
...<br />
spin_lock_irqsave(&local->queue_stop_reason_lock, flags)<br />
...<br />
ieee80211_free_txskb()<br />
ieee80211_report_used_skb()<br />
ieee80211_report_ack_skb()<br />
cfg80211_mgmt_tx_status_ext()<br />
nl80211_frame_tx_status()<br />
genlmsg_multicast_netns()<br />
genlmsg_multicast_netns_filtered()<br />
nlmsg_multicast_filtered()<br />
netlink_broadcast_filtered()<br />
do_one_broadcast()<br />
netlink_broadcast_deliver()<br />
__netlink_sendskb()<br />
netlink_deliver_tap()<br />
__netlink_deliver_tap_skb()<br />
dev_queue_xmit()<br />
__dev_queue_xmit() ; with IRQS disabled<br />
...<br />
spin_unlock_irqrestore(&local->queue_stop_reason_lock, flags)<br />
<br />
issues the warning (as reported by syzbot reproducer):<br />
<br />
WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120<br />
<br />
Fix this by implementing a two-phase skb reclamation in<br />
&#39;ieee80211_do_stop()&#39;, where actual work is performed<br />
outside of a section with interrupts disabled.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.32 (including) | 5.10.227 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/04f75f5bae33349283d6886901d9acd2f110c024
- https://git.kernel.org/stable/c/058c9026ad79dc98572442fd4c7e9a36aba6f596
- https://git.kernel.org/stable/c/07eb0bd7b0a8abed9d45e0f567c9af1dc83e5268
- https://git.kernel.org/stable/c/9d301de12da6e1bb069a9835c38359b8e8135121
- https://git.kernel.org/stable/c/acb53a716e492a02479345157c43f21edc8bc64b
- https://git.kernel.org/stable/c/ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec
- https://git.kernel.org/stable/c/db5ca4b42ccfa42d2af7b335ff12578e57775c02
- https://git.kernel.org/stable/c/eab272972cffff9cd973b8e4055a8e81c64f7e6a
- https://git.kernel.org/stable/c/f232916fab67ca1c3425926df4a866e59ff26908
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



