Skip to main content

CVE-2024-46860: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-46860cvecve-2024-46860
Published: Fri Sep 27 2024 (09/27/2024, 12:42:50 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change When disabling wifi mt7921_ipv6_addr_change() is called as a notifier. At this point mvif->phy is already NULL so we cannot use it here.

AI-Powered Analysis

AILast updated: 06/28/2025, 18:56:15 UTC

Technical Analysis

CVE-2024-46860 is a vulnerability identified in the Linux kernel specifically affecting the mt76 wireless driver, which supports the mt7921 Wi-Fi chipset. The issue arises in the function mt7921_ipv6_addr_change(), which is invoked as a notifier when the Wi-Fi interface is disabled. At this point, the internal pointer mvif->phy is already set to NULL, but the function attempts to access it without a proper NULL check, leading to a NULL pointer dereference. This type of vulnerability can cause a kernel panic or system crash, resulting in a denial of service (DoS). The vulnerability is rooted in improper handling of state changes within the wireless driver, specifically during IPv6 address changes on the mt7921 device. The mt76 driver is widely used in Linux distributions to support MediaTek wireless chipsets, including mt7921, which is common in many modern laptops and embedded devices. The vulnerability was published on September 27, 2024, and no known exploits are currently reported in the wild. The Linux vendor has resolved this issue by adding the necessary NULL pointer checks to prevent dereferencing a NULL pointer during the notifier call. No CVSS score has been assigned yet, but the vulnerability is classified as a kernel-level flaw affecting system stability and availability.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of denial of service on systems running Linux kernels with the affected mt76 driver version and using the mt7921 Wi-Fi chipset. This could lead to unexpected system crashes or reboots when the Wi-Fi interface is disabled or IPv6 address changes occur, potentially disrupting critical network connectivity. Organizations relying on Linux-based infrastructure, including servers, workstations, or embedded devices with this chipset, may experience operational interruptions. While the vulnerability does not directly lead to privilege escalation or data leakage, the resulting instability can impact availability and productivity. In sectors such as telecommunications, manufacturing, and public services where Linux-based devices are prevalent, this could affect service continuity. Given the widespread use of Linux in European enterprises and public institutions, especially in countries with strong open-source adoption like Germany, France, and the Netherlands, the impact could be significant if unpatched systems are present. However, the absence of known exploits and the requirement for specific hardware limits the scope of immediate risk.

Mitigation Recommendations

European organizations should promptly update their Linux kernels to the latest patched versions that include the fix for CVE-2024-46860. Specifically, ensure that the mt76 driver and related wireless firmware are updated to versions released after the vulnerability disclosure date. Network administrators should audit their device inventories to identify systems using the mt7921 chipset and verify kernel versions. For embedded devices or appliances where kernel updates are not straightforward, consider vendor firmware updates or workarounds such as disabling IPv6 on affected interfaces if feasible. Additionally, implement monitoring to detect unexpected system crashes or reboots that could indicate exploitation attempts or instability. Where possible, isolate critical systems from untrusted networks to reduce exposure. Maintain regular backups and incident response plans to quickly recover from potential denial of service events. Finally, stay informed through Linux kernel mailing lists and security advisories for any emerging exploit developments or additional patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.293Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe036e

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 6:56:15 PM

Last updated: 8/13/2025, 5:04:41 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats