CVE-2024-49939: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to add interface to list twice when SER If SER L2 occurs during the WoWLAN resume flow, the add interface flow is triggered by ieee80211_reconfig(). However, due to rtw89_wow_resume() return failure, it will cause the add interface flow to be executed again, resulting in a double add list and causing a kernel panic. Therefore, we have added a check to prevent double adding of the list. list_add double add: new=ffff99d6992e2010, prev=ffff99d6992e2010, next=ffff99d695302628. ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:37! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G W O 6.6.30-02659-gc18865c4dfbd #1 770df2933251a0e3c888ba69d1053a817a6376a7 Hardware name: HP Grunt/Grunt, BIOS Google_Grunt.11031.169.0 06/24/2021 Workqueue: events_freezable ieee80211_restart_work [mac80211] RIP: 0010:__list_add_valid_or_report+0x5e/0xb0 Code: c7 74 18 48 39 ce 74 13 b0 01 59 5a 5e 5f 41 58 41 59 41 5a 5d e9 e2 d6 03 00 cc 48 c7 c7 8d 4f 17 83 48 89 c2 e8 02 c0 00 00 <0f> 0b 48 c7 c7 aa 8c 1c 83 e8 f4 bf 00 00 0f 0b 48 c7 c7 c8 bc 12 RSP: 0018:ffffa91b8007bc50 EFLAGS: 00010246 RAX: 0000000000000058 RBX: ffff99d6992e0900 RCX: a014d76c70ef3900 RDX: ffffa91b8007bae8 RSI: 00000000ffffdfff RDI: 0000000000000001 RBP: ffffa91b8007bc88 R08: 0000000000000000 R09: ffffa91b8007bae0 R10: 00000000ffffdfff R11: ffffffff83a79800 R12: ffff99d695302060 R13: ffff99d695300900 R14: ffff99d6992e1be0 R15: ffff99d6992e2010 FS: 0000000000000000(0000) GS:ffff99d6aac00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000078fbdba43480 CR3: 000000010e464000 CR4: 00000000001506f0 Call Trace: <TASK> ? __die_body+0x1f/0x70 ? die+0x3d/0x60 ? do_trap+0xa4/0x110 ? __list_add_valid_or_report+0x5e/0xb0 ? do_error_trap+0x6d/0x90 ? __list_add_valid_or_report+0x5e/0xb0 ? handle_invalid_op+0x30/0x40 ? __list_add_valid_or_report+0x5e/0xb0 ? exc_invalid_op+0x3c/0x50 ? asm_exc_invalid_op+0x16/0x20 ? __list_add_valid_or_report+0x5e/0xb0 rtw89_ops_add_interface+0x309/0x310 [rtw89_core 7c32b1ee6854761c0321027c8a58c5160e41f48f] drv_add_interface+0x5c/0x130 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc] ieee80211_reconfig+0x241/0x13d0 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc] ? finish_wait+0x3e/0x90 ? synchronize_rcu_expedited+0x174/0x260 ? sync_rcu_exp_done_unlocked+0x50/0x50 ? wake_bit_function+0x40/0x40 ieee80211_restart_work+0xf0/0x140 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc] process_scheduled_works+0x1e5/0x480 worker_thread+0xea/0x1e0 kthread+0xdb/0x110 ? move_linked_works+0x90/0x90 ? kthread_associate_blkcg+0xa0/0xa0 ret_from_fork+0x3b/0x50 ? kthread_associate_blkcg+0xa0/0xa0 ret_from_fork_asm+0x11/0x20 </TASK> Modules linked in: dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc rfcomm cmac uinput algif_hash algif_skcipher af_alg btusb btrtl iio_trig_hrtimer industrialio_sw_trigger btmtk industrialio_configfs btbcm btintel uvcvideo videobuf2_vmalloc iio_trig_sysfs videobuf2_memops videobuf2_v4l2 videobuf2_common uvc snd_hda_codec_hdmi veth snd_hda_intel snd_intel_dspcfg acpi_als snd_hda_codec industrialio_triggered_buffer kfifo_buf snd_hwdep industrialio i2c_piix4 snd_hda_core designware_i2s ip6table_nat snd_soc_max98357a xt_MASQUERADE xt_cgroup snd_soc_acp_rt5682_mach fuse rtw89_8922ae(O) rtw89_8922a(O) rtw89_pci(O) rtw89_core(O) 8021q mac80211(O) bluetooth ecdh_generic ecc cfg80211 r8152 mii joydev gsmi: Log Shutdown Reason 0x03 ---[ end trace 0000000000000000 ]---
AI Analysis
Technical Summary
CVE-2024-49939 is a vulnerability in the Linux kernel specifically affecting the rtw89 Wi-Fi driver, which is responsible for Realtek 8922ae wireless chipsets. The issue arises during the WoWLAN (Wake on Wireless LAN) resume flow when a SER (Sudden Error Recovery) Level 2 event occurs. The vulnerability is triggered because the function ieee80211_reconfig() initiates an add interface operation. However, due to a failure return from rtw89_wow_resume(), the add interface operation is executed twice, causing the same interface to be added twice to a linked list. This double addition corrupts the kernel's linked list data structure, leading to a kernel panic and system crash. The kernel panic is evidenced by the BUG report at lib/list_debug.c:37, indicating an invalid opcode triggered by the double list addition. The stack trace shows the failure occurs in __list_add_valid_or_report(), called from rtw89_ops_add_interface() and ieee80211_reconfig(), confirming the root cause is the double addition of the interface in the rtw89 driver during WoWLAN resume. This vulnerability can cause denial of service (DoS) by crashing the kernel, requiring a system reboot. Since it occurs in the kernel space and affects wireless network interface management, it impacts system stability and availability. The vulnerability does not appear to require user interaction or elevated privileges beyond those needed to trigger the WoWLAN resume flow. The affected Linux kernel versions include those containing the specified commit e3ec7017f6a20d12ddd9fe23d345ebb7b8c104dd, which corresponds to recent kernel releases around version 6.6.30. No known exploits are reported in the wild yet, and no CVSS score has been assigned. The patch involves adding a check to prevent the double addition of the interface to the list, thus avoiding the kernel panic.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the rtw89 driver enabled and using Realtek 8922ae wireless chipsets. Such systems could experience unexpected kernel panics and crashes during WoWLAN resume operations, leading to denial of service. This can disrupt critical services, especially in environments relying on wireless connectivity for remote management, IoT devices, or embedded systems. The impact is more severe in sectors with high availability requirements such as telecommunications, healthcare, manufacturing, and public infrastructure. Additionally, repeated kernel panics could lead to data loss or corruption if systems are rebooted abruptly. Although no remote code execution or privilege escalation is indicated, the availability impact alone can cause operational disruptions. European organizations using Linux-based wireless infrastructure, laptops, or embedded devices with affected drivers should consider this vulnerability a stability and availability risk. Since the vulnerability is triggered during WoWLAN resume, devices that frequently use WoWLAN features are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits targeting this vulnerability to cause denial of service in critical systems.
Mitigation Recommendations
1. Apply the latest Linux kernel updates that include the patch for CVE-2024-49939 as soon as they become available. Monitor kernel mailing lists and vendor advisories for patch releases. 2. For systems where immediate patching is not feasible, consider disabling WoWLAN functionality to prevent triggering the vulnerable code path. This can be done via network manager settings or kernel module parameters. 3. Audit and inventory devices using the Realtek 8922ae chipset and the rtw89 driver to identify potentially vulnerable endpoints. 4. Implement monitoring for kernel panics and unexpected reboots on Linux systems to detect potential exploitation or triggering of this vulnerability. 5. For critical infrastructure, consider deploying redundant systems or failover mechanisms to maintain availability in case of kernel crashes. 6. Engage with Linux distribution vendors and hardware manufacturers to confirm patch availability and coordinate timely updates. 7. Limit physical and network access to devices with this vulnerability to reduce the risk of triggering the WoWLAN resume flow maliciously or accidentally. 8. Review and test kernel updates in controlled environments before wide deployment to ensure stability and compatibility.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-49939: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to add interface to list twice when SER If SER L2 occurs during the WoWLAN resume flow, the add interface flow is triggered by ieee80211_reconfig(). However, due to rtw89_wow_resume() return failure, it will cause the add interface flow to be executed again, resulting in a double add list and causing a kernel panic. Therefore, we have added a check to prevent double adding of the list. list_add double add: new=ffff99d6992e2010, prev=ffff99d6992e2010, next=ffff99d695302628. ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:37! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G W O 6.6.30-02659-gc18865c4dfbd #1 770df2933251a0e3c888ba69d1053a817a6376a7 Hardware name: HP Grunt/Grunt, BIOS Google_Grunt.11031.169.0 06/24/2021 Workqueue: events_freezable ieee80211_restart_work [mac80211] RIP: 0010:__list_add_valid_or_report+0x5e/0xb0 Code: c7 74 18 48 39 ce 74 13 b0 01 59 5a 5e 5f 41 58 41 59 41 5a 5d e9 e2 d6 03 00 cc 48 c7 c7 8d 4f 17 83 48 89 c2 e8 02 c0 00 00 <0f> 0b 48 c7 c7 aa 8c 1c 83 e8 f4 bf 00 00 0f 0b 48 c7 c7 c8 bc 12 RSP: 0018:ffffa91b8007bc50 EFLAGS: 00010246 RAX: 0000000000000058 RBX: ffff99d6992e0900 RCX: a014d76c70ef3900 RDX: ffffa91b8007bae8 RSI: 00000000ffffdfff RDI: 0000000000000001 RBP: ffffa91b8007bc88 R08: 0000000000000000 R09: ffffa91b8007bae0 R10: 00000000ffffdfff R11: ffffffff83a79800 R12: ffff99d695302060 R13: ffff99d695300900 R14: ffff99d6992e1be0 R15: ffff99d6992e2010 FS: 0000000000000000(0000) GS:ffff99d6aac00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000078fbdba43480 CR3: 000000010e464000 CR4: 00000000001506f0 Call Trace: <TASK> ? __die_body+0x1f/0x70 ? die+0x3d/0x60 ? do_trap+0xa4/0x110 ? __list_add_valid_or_report+0x5e/0xb0 ? do_error_trap+0x6d/0x90 ? __list_add_valid_or_report+0x5e/0xb0 ? handle_invalid_op+0x30/0x40 ? __list_add_valid_or_report+0x5e/0xb0 ? exc_invalid_op+0x3c/0x50 ? asm_exc_invalid_op+0x16/0x20 ? __list_add_valid_or_report+0x5e/0xb0 rtw89_ops_add_interface+0x309/0x310 [rtw89_core 7c32b1ee6854761c0321027c8a58c5160e41f48f] drv_add_interface+0x5c/0x130 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc] ieee80211_reconfig+0x241/0x13d0 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc] ? finish_wait+0x3e/0x90 ? synchronize_rcu_expedited+0x174/0x260 ? sync_rcu_exp_done_unlocked+0x50/0x50 ? wake_bit_function+0x40/0x40 ieee80211_restart_work+0xf0/0x140 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc] process_scheduled_works+0x1e5/0x480 worker_thread+0xea/0x1e0 kthread+0xdb/0x110 ? move_linked_works+0x90/0x90 ? kthread_associate_blkcg+0xa0/0xa0 ret_from_fork+0x3b/0x50 ? kthread_associate_blkcg+0xa0/0xa0 ret_from_fork_asm+0x11/0x20 </TASK> Modules linked in: dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc rfcomm cmac uinput algif_hash algif_skcipher af_alg btusb btrtl iio_trig_hrtimer industrialio_sw_trigger btmtk industrialio_configfs btbcm btintel uvcvideo videobuf2_vmalloc iio_trig_sysfs videobuf2_memops videobuf2_v4l2 videobuf2_common uvc snd_hda_codec_hdmi veth snd_hda_intel snd_intel_dspcfg acpi_als snd_hda_codec industrialio_triggered_buffer kfifo_buf snd_hwdep industrialio i2c_piix4 snd_hda_core designware_i2s ip6table_nat snd_soc_max98357a xt_MASQUERADE xt_cgroup snd_soc_acp_rt5682_mach fuse rtw89_8922ae(O) rtw89_8922a(O) rtw89_pci(O) rtw89_core(O) 8021q mac80211(O) bluetooth ecdh_generic ecc cfg80211 r8152 mii joydev gsmi: Log Shutdown Reason 0x03 ---[ end trace 0000000000000000 ]---
AI-Powered Analysis
Technical Analysis
CVE-2024-49939 is a vulnerability in the Linux kernel specifically affecting the rtw89 Wi-Fi driver, which is responsible for Realtek 8922ae wireless chipsets. The issue arises during the WoWLAN (Wake on Wireless LAN) resume flow when a SER (Sudden Error Recovery) Level 2 event occurs. The vulnerability is triggered because the function ieee80211_reconfig() initiates an add interface operation. However, due to a failure return from rtw89_wow_resume(), the add interface operation is executed twice, causing the same interface to be added twice to a linked list. This double addition corrupts the kernel's linked list data structure, leading to a kernel panic and system crash. The kernel panic is evidenced by the BUG report at lib/list_debug.c:37, indicating an invalid opcode triggered by the double list addition. The stack trace shows the failure occurs in __list_add_valid_or_report(), called from rtw89_ops_add_interface() and ieee80211_reconfig(), confirming the root cause is the double addition of the interface in the rtw89 driver during WoWLAN resume. This vulnerability can cause denial of service (DoS) by crashing the kernel, requiring a system reboot. Since it occurs in the kernel space and affects wireless network interface management, it impacts system stability and availability. The vulnerability does not appear to require user interaction or elevated privileges beyond those needed to trigger the WoWLAN resume flow. The affected Linux kernel versions include those containing the specified commit e3ec7017f6a20d12ddd9fe23d345ebb7b8c104dd, which corresponds to recent kernel releases around version 6.6.30. No known exploits are reported in the wild yet, and no CVSS score has been assigned. The patch involves adding a check to prevent the double addition of the interface to the list, thus avoiding the kernel panic.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the rtw89 driver enabled and using Realtek 8922ae wireless chipsets. Such systems could experience unexpected kernel panics and crashes during WoWLAN resume operations, leading to denial of service. This can disrupt critical services, especially in environments relying on wireless connectivity for remote management, IoT devices, or embedded systems. The impact is more severe in sectors with high availability requirements such as telecommunications, healthcare, manufacturing, and public infrastructure. Additionally, repeated kernel panics could lead to data loss or corruption if systems are rebooted abruptly. Although no remote code execution or privilege escalation is indicated, the availability impact alone can cause operational disruptions. European organizations using Linux-based wireless infrastructure, laptops, or embedded devices with affected drivers should consider this vulnerability a stability and availability risk. Since the vulnerability is triggered during WoWLAN resume, devices that frequently use WoWLAN features are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits targeting this vulnerability to cause denial of service in critical systems.
Mitigation Recommendations
1. Apply the latest Linux kernel updates that include the patch for CVE-2024-49939 as soon as they become available. Monitor kernel mailing lists and vendor advisories for patch releases. 2. For systems where immediate patching is not feasible, consider disabling WoWLAN functionality to prevent triggering the vulnerable code path. This can be done via network manager settings or kernel module parameters. 3. Audit and inventory devices using the Realtek 8922ae chipset and the rtw89 driver to identify potentially vulnerable endpoints. 4. Implement monitoring for kernel panics and unexpected reboots on Linux systems to detect potential exploitation or triggering of this vulnerability. 5. For critical infrastructure, consider deploying redundant systems or failover mechanisms to maintain availability in case of kernel crashes. 6. Engage with Linux distribution vendors and hardware manufacturers to confirm patch availability and coordinate timely updates. 7. Limit physical and network access to devices with this vulnerability to reduce the risk of triggering the WoWLAN resume flow maliciously or accidentally. 8. Review and test kernel updates in controlled environments before wide deployment to ensure stability and compatibility.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T12:17:06.043Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9826c4522896dcbe0a82
Added to database: 5/21/2025, 9:08:54 AM
Last enriched: 6/28/2025, 9:55:49 PM
Last updated: 8/5/2025, 6:36:46 AM
Views: 15
Related Threats
CVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.