CVE-2024-49938

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit Syzbot points out that skb_trim() has a sanity check on the existing length of the skb, which can be uninitialised in some error paths. The intent here is clearly just to reset the length to zero before resubmitting, so switch to calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length() already contains a call to skb_reset_tail_pointer(), so remove the redundant call. The syzbot report came from ath9k_hif_usb_reg_in_cb(), but there's a similar usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we're at it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Nov 2024, 15:25

Type Values Removed Values Added
CWE CWE-824
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/a9f4e28e8adaf0715bd4e01462af0a52ee46b01f - () https://git.kernel.org/stable/c/a9f4e28e8adaf0715bd4e01462af0a52ee46b01f - Patch
References () https://git.kernel.org/stable/c/e37e348835032d6940ec89308cc8996ded691d2d - () https://git.kernel.org/stable/c/e37e348835032d6940ec89308cc8996ded691d2d - Patch
References () https://git.kernel.org/stable/c/94745807f3ebd379f23865e6dab196f220664179 - () https://git.kernel.org/stable/c/94745807f3ebd379f23865e6dab196f220664179 - Patch
References () https://git.kernel.org/stable/c/e6b9bf32e0695e4f374674002de0527d2a6768eb - () https://git.kernel.org/stable/c/e6b9bf32e0695e4f374674002de0527d2a6768eb - Patch
References () https://git.kernel.org/stable/c/b02eb7c86ff2ef1411c3095ec8a52b13f68db04f - () https://git.kernel.org/stable/c/b02eb7c86ff2ef1411c3095ec8a52b13f68db04f - Patch
References () https://git.kernel.org/stable/c/d1f2fbc6a769081503f6ffedbb5cd1ac497f0e77 - () https://git.kernel.org/stable/c/d1f2fbc6a769081503f6ffedbb5cd1ac497f0e77 - Patch
References () https://git.kernel.org/stable/c/6a875220670475d9247e576c15dc29823100a4e4 - () https://git.kernel.org/stable/c/6a875220670475d9247e576c15dc29823100a4e4 - Patch
References () https://git.kernel.org/stable/c/012ae530afa0785102360de452745d33c99a321b - () https://git.kernel.org/stable/c/012ae530afa0785102360de452745d33c99a321b - Patch
References () https://git.kernel.org/stable/c/2c230210ec0ae6ed08306ac70dc21c24b817bb95 - () https://git.kernel.org/stable/c/2c230210ec0ae6ed08306ac70dc21c24b817bb95 - Patch

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/e6b9bf32e0695e4f374674002de0527d2a6768eb -
  • () https://git.kernel.org/stable/c/d1f2fbc6a769081503f6ffedbb5cd1ac497f0e77 -

21 Oct 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 18:15

Updated : 2024-11-13 15:25


NVD link : CVE-2024-49938

Mitre link : CVE-2024-49938


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-824

Access of Uninitialized Pointer