CVE-2024-47713

Source
https://cve.org/CVERecord?id=CVE-2024-47713
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47713.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47713
Downstream
Related
Published
2024-10-21T11:53:45.433Z
Modified
2026-03-11T07:50:42.276018Z
Summary
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: use two-phase skb reclamation in ieee80211dostop()

Since '__devqueuexmit()' should be called with interrupts enabled, the following backtrace:

ieee80211dostop() ... spinlockirqsave(&local->queuestopreasonlock, flags) ... ieee80211freetxskb() ieee80211reportusedskb() ieee80211reportackskb() cfg80211mgmttxstatusext() nl80211frametxstatus() genlmsgmulticastnetns() genlmsgmulticastnetnsfiltered() nlmsgmulticastfiltered() netlinkbroadcastfiltered() doonebroadcast() netlinkbroadcast_deliver() __netlinksendskb() netlinkdeliver_tap() __netlinkdelivertapskb() devqueue_xmit() _devqueuexmit() ; with IRQS disabled ... spinunlockirqrestore(&local->queuestopreasonlock, flags)

issues the warning (as reported by syzbot reproducer):

WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 _localbhenableip+0xc3/0x120

Fix this by implementing a two-phase skb reclamation in 'ieee80211dostop()', where actual work is performed outside of a section with interrupts disabled.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47713.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5061b0c2b9066de426fbc63f1278d2210e789412
Fixed
07eb0bd7b0a8abed9d45e0f567c9af1dc83e5268
Fixed
04f75f5bae33349283d6886901d9acd2f110c024
Fixed
f232916fab67ca1c3425926df4a866e59ff26908
Fixed
acb53a716e492a02479345157c43f21edc8bc64b
Fixed
db5ca4b42ccfa42d2af7b335ff12578e57775c02
Fixed
058c9026ad79dc98572442fd4c7e9a36aba6f596
Fixed
eab272972cffff9cd973b8e4055a8e81c64f7e6a
Fixed
ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec
Fixed
9d301de12da6e1bb069a9835c38359b8e8135121

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47713.json"