CVE-2024-47712

Source
https://cve.org/CVERecord?id=CVE-2024-47712
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47712.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47712
Downstream
Related
Published
2024-10-21T11:53:44.763Z
Modified
2026-03-20T12:38:05.220183Z
Summary
wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: fix potential RCU dereference issue in wilcparsejoinbssparam

In the wilc_parse_join_bss_param function, the TSF field of the ies structure is accessed after the RCU read-side critical section is unlocked. According to RCU usage rules, this is illegal. Reusing this pointer can lead to unpredictable behavior, including accessing memory that has been updated or causing use-after-free issues.

This possible bug was identified using a static analysis tool developed by myself, specifically designed to detect RCU-related issues.

To address this, the TSF value is now stored in a local variable ies_tsf before the RCU lock is released. The param->tsf_lo field is then assigned using this local variable, ensuring that the TSF value is safely accessed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47712.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e556006de4ea93abe2b46cba202a2556c544b8b2
Fixed
5a24cedc243ace5ed7c1016f52a7bfc8f5b07815
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b4bbf38c350acb6500cbe667b1e2e68f896e4b38
Fixed
557418e1704605a81c9e26732449f71b1d40ba1e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d80fc436751cfa6b02a8eda74eb6cce7dadfe5a2
Fixed
bf090f4fe935294361eabd9dc5a949fdd77d3d1b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
745003b5917b610352f52fe0d11ef658d6471ec2
Fixed
b040b71d99ee5e17bb7a743dc01cbfcae8908ce1
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4bfd20d5f5c62b5495d6c0016ee6933bd3add7ce
Fixed
84398204c5df5aaf89453056cf0647cda9664d2b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
205c50306acf58a335eb19fa84e40140f4fe814f
Fixed
2f944e6255c2fc1c9bd9ee32f6b14ee0b2a51eb5
Fixed
79510414a7626317f13cc9073244ab7a8deb3192
Fixed
6d7c6ae1efb1ff68bc01d79d94fdf0388f86cdd8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
5800ec78775c0cd646f71eb9bf8402fb794807de
Last affected
dd50d3ead6e3707bb0a5df7cc832730c93ace3a7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47712.json"