In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
Since '__dev_queue_xmit()' should be called with interrupts enabled,
the following backtrace:
ieee80211_do_stop()
...
spin_lock_irqsave(&local->queue_stop_reason_lock, flags)
...
ieee80211_free_txskb()
ieee80211_report_used_skb()
ieee80211_report_ack_skb()
cfg80211_mgmt_tx_status_ext()
nl80211_frame_tx_status()
genlmsg_multicast_netns()
genlmsg_multicast_netns_filtered()
nlmsg_multicast_filtered()
netlink_broadcast_filtered()
do_one_broadcast()
netlink_broadcast_deliver()
__netlink_sendskb()
netlink_deliver_tap()
__netlink_deliver_tap_skb()
dev_queue_xmit()
__dev_queue_xmit() ; with IRQS disabled
...
spin_unlock_irqrestore(&local->queue_stop_reason_lock, flags)
issues the warning (as reported by syzbot reproducer):
WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120
Fix this by implementing a two-phase skb reclamation in
'ieee80211_do_stop()', where actual work is performed
outside of a section with interrupts disabled.
References
Configurations
Configuration 1 (hide)
|
History
08 Nov 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Oct 2024, 14:19
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/058c9026ad79dc98572442fd4c7e9a36aba6f596 - Patch | |
References | () https://git.kernel.org/stable/c/9d301de12da6e1bb069a9835c38359b8e8135121 - Patch | |
References | () https://git.kernel.org/stable/c/acb53a716e492a02479345157c43f21edc8bc64b - Patch | |
References | () https://git.kernel.org/stable/c/ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec - Patch | |
References | () https://git.kernel.org/stable/c/db5ca4b42ccfa42d2af7b335ff12578e57775c02 - Patch | |
References | () https://git.kernel.org/stable/c/eab272972cffff9cd973b8e4055a8e81c64f7e6a - Patch | |
References | () https://git.kernel.org/stable/c/f232916fab67ca1c3425926df4a866e59ff26908 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
CWE | NVD-CWE-noinfo |
21 Oct 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-21 12:15
Updated : 2024-11-08 16:15
NVD link : CVE-2024-47713
Mitre link : CVE-2024-47713
CVE.ORG link : CVE-2024-47713
JSON object : View
Products Affected
linux
- linux_kernel
CWE