Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-35811

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-17 May, 2024 | 13:23
Updated At-04 May, 2025 | 09:05
Rejected At-
Credits

wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach This is the candidate patch of CVE-2023-47233 : https://nvd.nist.gov/vuln/detail/CVE-2023-47233 In brcm80211 driver,it starts with the following invoking chain to start init a timeout worker: ->brcmf_usb_probe ->brcmf_usb_probe_cb ->brcmf_attach ->brcmf_bus_started ->brcmf_cfg80211_attach ->wl_init_priv ->brcmf_init_escan ->INIT_WORK(&cfg->escan_timeout_work, brcmf_cfg80211_escan_timeout_worker); If we disconnect the USB by hotplug, it will call brcmf_usb_disconnect to make cleanup. The invoking chain is : brcmf_usb_disconnect ->brcmf_usb_disconnect_cb ->brcmf_detach ->brcmf_cfg80211_detach ->kfree(cfg); While the timeout woker may still be running. This will cause a use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker. Fix it by deleting the timer and canceling the worker in brcmf_cfg80211_detach. [arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:17 May, 2024 | 13:23
Updated At:04 May, 2025 | 09:05
Rejected At:
▼CVE Numbering Authority (CNA)
wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach This is the candidate patch of CVE-2023-47233 : https://nvd.nist.gov/vuln/detail/CVE-2023-47233 In brcm80211 driver,it starts with the following invoking chain to start init a timeout worker: ->brcmf_usb_probe ->brcmf_usb_probe_cb ->brcmf_attach ->brcmf_bus_started ->brcmf_cfg80211_attach ->wl_init_priv ->brcmf_init_escan ->INIT_WORK(&cfg->escan_timeout_work, brcmf_cfg80211_escan_timeout_worker); If we disconnect the USB by hotplug, it will call brcmf_usb_disconnect to make cleanup. The invoking chain is : brcmf_usb_disconnect ->brcmf_usb_disconnect_cb ->brcmf_detach ->brcmf_cfg80211_detach ->kfree(cfg); While the timeout woker may still be running. This will cause a use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker. Fix it by deleting the timer and canceling the worker in brcmf_cfg80211_detach. [arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
Default Status
unaffected
Versions
Affected
  • From e756af5b30b008f6ffcfebf8ad0b477f6f225b62 before 202c503935042272e2f9e1bb549d5f69a8681169 (git)
  • From e756af5b30b008f6ffcfebf8ad0b477f6f225b62 before 8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1 (git)
  • From e756af5b30b008f6ffcfebf8ad0b477f6f225b62 before bacb8c3ab86dcd760c15903fcee58169bc3026aa (git)
  • From e756af5b30b008f6ffcfebf8ad0b477f6f225b62 before 8c36205123dc57349b59b4f1a2301eb278cbc731 (git)
  • From e756af5b30b008f6ffcfebf8ad0b477f6f225b62 before 0b812f706fd7090be74812101114a0e165b36744 (git)
  • From e756af5b30b008f6ffcfebf8ad0b477f6f225b62 before 190794848e2b9d15de92d502b6ac652806904f5a (git)
  • From e756af5b30b008f6ffcfebf8ad0b477f6f225b62 before 6678a1e7d896c00030b31491690e8ddc9a90767a (git)
  • From e756af5b30b008f6ffcfebf8ad0b477f6f225b62 before 0a7591e14a8da794d0b93b5d1c6254ccb23adacb (git)
  • From e756af5b30b008f6ffcfebf8ad0b477f6f225b62 before 0f7352557a35ab7888bc7831411ec8a3cbe20d78 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
Default Status
affected
Versions
Affected
  • 3.7
Unaffected
  • From 0 before 3.7 (semver)
  • From 4.19.312 through 4.19.* (semver)
  • From 5.4.274 through 5.4.* (semver)
  • From 5.10.215 through 5.10.* (semver)
  • From 5.15.154 through 5.15.* (semver)
  • From 6.1.84 through 6.1.* (semver)
  • From 6.6.24 through 6.6.* (semver)
  • From 6.7.12 through 6.7.* (semver)
  • From 6.8.3 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169
N/A
https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1
N/A
https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa
N/A
https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731
N/A
https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744
N/A
https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a
N/A
https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a
N/A
https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb
N/A
https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78
N/A
Hyperlink: https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169
x_transferred
https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1
x_transferred
https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa
x_transferred
https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731
x_transferred
https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744
x_transferred
https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a
x_transferred
https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a
x_transferred
https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb
x_transferred
https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
x_transferred
Hyperlink: https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:17 May, 2024 | 14:15
Updated At:14 Jan, 2025 | 14:23

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach This is the candidate patch of CVE-2023-47233 : https://nvd.nist.gov/vuln/detail/CVE-2023-47233 In brcm80211 driver,it starts with the following invoking chain to start init a timeout worker: ->brcmf_usb_probe ->brcmf_usb_probe_cb ->brcmf_attach ->brcmf_bus_started ->brcmf_cfg80211_attach ->wl_init_priv ->brcmf_init_escan ->INIT_WORK(&cfg->escan_timeout_work, brcmf_cfg80211_escan_timeout_worker); If we disconnect the USB by hotplug, it will call brcmf_usb_disconnect to make cleanup. The invoking chain is : brcmf_usb_disconnect ->brcmf_usb_disconnect_cb ->brcmf_detach ->brcmf_cfg80211_detach ->kfree(cfg); While the timeout woker may still be running. This will cause a use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker. Fix it by deleting the timer and canceling the worker in brcmf_cfg80211_detach. [arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 3.7(inclusive) to 4.19.312(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.274(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.215(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.154(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.84(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.24(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.7.12(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.8(inclusive) to 6.8.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Primarynvd@nist.gov
CWE ID: CWE-416
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacbaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5aaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767aaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aaaf854a3a-2127-422b-91ae-364da2661108
Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Hyperlink: https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found