CVE-2024-46860

Source
https://cve.org/CVERecord?id=CVE-2024-46860
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46860.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46860
Downstream
Related
Published
2024-09-27T12:42:50.464Z
Modified
2026-03-20T12:37:58.294019Z
Summary
wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921: fix NULL pointer access in mt7921ipv6addr_change

When disabling wifi mt7921ipv6addr_change() is called as a notifier. At this point mvif->phy is already NULL so we cannot use it here.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46860.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7bc04215a66b60e198aecaee8418f6d79fa19faa
Fixed
4bfee9346d8c17d928ef6da2b8bffab88fa2a553
Fixed
8d92bafd4c67efb692f722d73a07412b5f88c6d6
Fixed
479ffee68d59c599f8aed8fa2dcc8e13e7bd13c3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46860.json"