๐Ÿ” CVE Alert

CVE-2024-47713

UNKNOWN 0.0

wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() Since '__dev_queue_xmit()' should be called with interrupts enabled, the following backtrace: ieee80211_do_stop() ... spin_lock_irqsave(&local->queue_stop_reason_lock, flags) ... ieee80211_free_txskb() ieee80211_report_used_skb() ieee80211_report_ack_skb() cfg80211_mgmt_tx_status_ext() nl80211_frame_tx_status() genlmsg_multicast_netns() genlmsg_multicast_netns_filtered() nlmsg_multicast_filtered() netlink_broadcast_filtered() do_one_broadcast() netlink_broadcast_deliver() __netlink_sendskb() netlink_deliver_tap() __netlink_deliver_tap_skb() dev_queue_xmit() __dev_queue_xmit() ; with IRQS disabled ... spin_unlock_irqrestore(&local->queue_stop_reason_lock, flags) issues the warning (as reported by syzbot reproducer): WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120 Fix this by implementing a two-phase skb reclamation in 'ieee80211_do_stop()', where actual work is performed outside of a section with interrupts disabled.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5061b0c2b9066de426fbc63f1278d2210e789412 < 07eb0bd7b0a8abed9d45e0f567c9af1dc83e5268 5061b0c2b9066de426fbc63f1278d2210e789412 < 04f75f5bae33349283d6886901d9acd2f110c024 5061b0c2b9066de426fbc63f1278d2210e789412 < f232916fab67ca1c3425926df4a866e59ff26908 5061b0c2b9066de426fbc63f1278d2210e789412 < acb53a716e492a02479345157c43f21edc8bc64b 5061b0c2b9066de426fbc63f1278d2210e789412 < db5ca4b42ccfa42d2af7b335ff12578e57775c02 5061b0c2b9066de426fbc63f1278d2210e789412 < 058c9026ad79dc98572442fd4c7e9a36aba6f596 5061b0c2b9066de426fbc63f1278d2210e789412 < eab272972cffff9cd973b8e4055a8e81c64f7e6a 5061b0c2b9066de426fbc63f1278d2210e789412 < ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec 5061b0c2b9066de426fbc63f1278d2210e789412 < 9d301de12da6e1bb069a9835c38359b8e8135121
Linux / Linux
2.6.32

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/07eb0bd7b0a8abed9d45e0f567c9af1dc83e5268 git.kernel.org: https://git.kernel.org/stable/c/04f75f5bae33349283d6886901d9acd2f110c024 git.kernel.org: https://git.kernel.org/stable/c/f232916fab67ca1c3425926df4a866e59ff26908 git.kernel.org: https://git.kernel.org/stable/c/acb53a716e492a02479345157c43f21edc8bc64b git.kernel.org: https://git.kernel.org/stable/c/db5ca4b42ccfa42d2af7b335ff12578e57775c02 git.kernel.org: https://git.kernel.org/stable/c/058c9026ad79dc98572442fd4c7e9a36aba6f596 git.kernel.org: https://git.kernel.org/stable/c/eab272972cffff9cd973b8e4055a8e81c64f7e6a git.kernel.org: https://git.kernel.org/stable/c/ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec git.kernel.org: https://git.kernel.org/stable/c/9d301de12da6e1bb069a9835c38359b8e8135121 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html