CVE-2024-47738Improper Handling of Exceptional Conditions in Linux

Severity
3.3LOWNVD
OSV8.8
EPSS
0.0%
top 96.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 21
Latest updateApr 28

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't use rate mask for offchannel TX either Like the commit ab9177d83c04 ("wifi: mac80211: don't use rate mask for scanning"), ignore incorrect settings to avoid no supported rate warning reported by syzbot. The syzbot did bisect and found cause is commit 9df66d5b9f45 ("cfg80211: fix default HE tx bitrate mask in 2G band"), which however corrects bitmask of HE MCS and recognizes correctly settings of empty le

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LExploitability: 1.8 | Impact: 1.4

Affected Packages13 packages

Patches

🔴Vulnerability Details

17
OSV
linux-azure-nvidia vulnerabilities2025-04-28
OSV
linux-azure-6.8 vulnerabilities2025-04-01
OSV
linux-hwe-6.8 vulnerabilities2025-04-01
OSV
linux-azure vulnerabilities2025-03-27
OSV
linux-oem-6.8 vulnerabilities2025-03-27

📋Vendor Advisories

18
Ubuntu
Linux kernel (Azure, N-Series) vulnerabilities2025-04-28
Ubuntu
Linux kernel (Azure) vulnerabilities2025-04-01
Ubuntu
Linux kernel (HWE) vulnerabilities2025-04-01
Ubuntu
Linux kernel (IBM) vulnerabilities2025-03-27
Ubuntu
Linux kernel (Azure) vulnerabilities2025-03-27