CVE-2024-47738

Source
https://cve.org/CVERecord?id=CVE-2024-47738
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47738.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47738
Downstream
Related
Published
2024-10-21T12:14:07.825Z
Modified
2026-03-20T12:39:13.582466Z
Summary
wifi: mac80211: don't use rate mask for offchannel TX either
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't use rate mask for offchannel TX either

Like the commit ab9177d83c04 ("wifi: mac80211: don't use rate mask for scanning"), ignore incorrect settings to avoid no supported rate warning reported by syzbot.

The syzbot did bisect and found cause is commit 9df66d5b9f45 ("cfg80211: fix default HE tx bitrate mask in 2G band"), which however corrects bitmask of HE MCS and recognizes correctly settings of empty legacy rate plus HE MCS rate instead of returning -EINVAL.

As suggestions [1], follow the change of SCAN TX to consider this case of offchannel TX as well.

[1] https://lore.kernel.org/linux-wireless/6ab2dc9c3afe753ca6fdcdd1421e7a1f47e87b84.camel@sipsolutions.net/T/#m2ac2a6d2be06a37c9c47a3d8a44b4f647ed4f024

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47738.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9df66d5b9f45c39b3925d16e8947cc10009b186d
Fixed
aafca50e71dc8f3192a5bfb325135a7908f3ef9e
Fixed
d54455a3a965feb547711aff7afd2ca5deadb99c
Fixed
3565ef215101ffadb5fe5394c70b1fca51376b25
Fixed
43897111481b679508711d3ca881c4c6593e9247
Fixed
e7a7ef9a0742dbd0818d5b15fba2c5313ace765b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
1b728869a13470e4c25e8faf0dbb95a009c6850b
Last affected
ccedf8163fa66f2db85d863a43f056ac69a5fef5
Last affected
5924678a442d0f5ebf33ebb76b470e68414f1318

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47738.json"