Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-46760— wifi: rtw88: usb: schedule rx work after everything is set up

EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-46760

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
wifi: rtw88: usb: schedule rx work after everything is set up
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: usb: schedule rx work after everything is set up Right now it's possible to hit NULL pointer dereference in rtw_rx_fill_rx_status on hw object and/or its fields because initialization routine can start getting USB replies before rtw_dev is fully setup. The stack trace looks like this: rtw_rx_fill_rx_status rtw8821c_query_rx_desc rtw_usb_rx_handler ... queue_work rtw_usb_read_port_complete ... usb_submit_urb rtw_usb_rx_resubmit rtw_usb_init_rx rtw_usb_probe So while we do the async stuff rtw_usb_probe continues and calls rtw_register_hw, which does all kinds of initialization (e.g. via ieee80211_register_hw) that rtw_rx_fill_rx_status relies on. Fix this by moving the first usb_submit_urb after everything is set up. For me, this bug manifested as: [ 8.893177] rtw_8821cu 1-1:1.2: band wrong, packet dropped [ 8.910904] rtw_8821cu 1-1:1.2: hw->conf.chandef.chan NULL in rtw_rx_fill_rx_status because I'm using Larry's backport of rtw88 driver with the NULL checks in rtw_rx_fill_rx_status.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于空指针取消引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux e3037485c68ec1a299ff41160d8fedbd4abc29b9 ~ c83d464b82a8ad62ec9077637f75d73fe955635a -
LinuxLinux 5.2 -

II. Public POCs for CVE-2024-46760

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-46760

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-09-18 · 85 CVEs total

CVE-2024-46770ice: Add netif_device_attach/detach into PF reset flow
CVE-2024-46781nilfs2: fix missing cleanup on rollforward recovery error
CVE-2024-46768hwmon: (hp-wmi-sensors) Check if WMI event data exists
CVE-2024-46769spi: intel: Add check devm_kasprintf() returned value
CVE-2024-46767net: phy: Fix missing of_node_put() for leds
CVE-2024-46765ice: protect XDP configuration with a mutex
CVE-2024-46763fou: Fix null-ptr-deref in GRO.
CVE-2024-46762xen: privcmd: Fix possible access to a freed kirqfd instance
CVE-2024-46761pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
CVE-2024-46764bpf: add check for invalid name in btf_name_valid_section()
CVE-2024-46771can: bcm: Remove proc entry when dev is unregistered.
CVE-2024-46772drm/amd/display: Check denominator crb_pipes before used
CVE-2024-46773drm/amd/display: Check denominator pbn_div before used
CVE-2024-46774powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
CVE-2024-46775drm/amd/display: Validate function returns
CVE-2024-46776drm/amd/display: Run DC_LOG_DC after checking link->link_enc
CVE-2024-46777udf: Avoid excessive partition lengths
CVE-2024-46778drm/amd/display: Check UnboundedRequestEnabled's value
CVE-2024-46779drm/imagination: Free pvr_vm_gpuva after unlink
CVE-2024-46780nilfs2: protect references to superblock parameters exposed in sysfs

Showing top 20 of 85 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-46760

No comments yet


Leave a comment