VYPR
Medium severity5.5NVD Advisory· Published Oct 21, 2024· Updated May 12, 2026

CVE-2024-47713

CVE-2024-47713

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()

Since '__dev_queue_xmit()' should be called with interrupts enabled, the following backtrace:

ieee80211_do_stop() ... spin_lock_irqsave(&local->queue_stop_reason_lock, flags) ... ieee80211_free_txskb() ieee80211_report_used_skb() ieee80211_report_ack_skb() cfg80211_mgmt_tx_status_ext() nl80211_frame_tx_status() genlmsg_multicast_netns() genlmsg_multicast_netns_filtered() nlmsg_multicast_filtered() netlink_broadcast_filtered() do_one_broadcast() netlink_broadcast_deliver() __netlink_sendskb() netlink_deliver_tap() __netlink_deliver_tap_skb() dev_queue_xmit() __dev_queue_xmit() ; with IRQS disabled ... spin_unlock_irqrestore(&local->queue_stop_reason_lock, flags)

issues the warning (as reported by syzbot reproducer):

WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120

Fix this by implementing a two-phase skb reclamation in 'ieee80211_do_stop()', where actual work is performed outside of a section with interrupts disabled.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, a bug in mac80211's ieee80211_do_stop() causes a warning due to calling __dev_queue_xmit() with interrupts disabled.

Vulnerability

Description

In the Linux kernel's mac80211 subsystem, the function ieee80211_do_stop() reclaims transmitted skbs while holding a spinlock with interrupts disabled. During this process, ieee80211_free_txskb() can trigger a call to __dev_queue_xmit() via a chain of functions, which expects interrupts to be enabled. This violation leads to a warning from the kernel's softirq subsystem, as observed by syzbot.

Exploitation

The vulnerability is triggered during normal network interface shutdown operations. An attacker with local access and the ability to trigger device stop operations (e.g., via netlink) could reproduce the warning. However, no known exploit exists, and the issue primarily manifests as a kernel warning rather than a security breach.

Impact

The primary impact is a kernel warning and potential system instability due to unexpected softirq handling. While not directly exploitable for privilege escalation or data corruption, it can cause denial of service by crashing the system or hanging the network stack.

Mitigation

The fix was implemented in Linux kernel commits [3] and [4], which introduce a two-phase skb reclamation approach. The work is deferred to a point where interrupts are enabled, avoiding the warning. Users should apply the latest stable kernel updates to resolve the issue.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

114

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

13

News mentions

0

No linked articles in our index yet.