CVE-2024-27056

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists The resume code path assumes that the TX queue for the offloading TID has been configured. At resume time it then tries to sync the write pointer as it may have been updated by the firmware. In the unusual event that no packets have been send on TID 0, the queue will not have been allocated and this causes a crash. Fix this by ensuring the queue exist at suspend time.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*

History

18 Sep 2025, 15:28

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/35afffaddbe8d310dc61659da0b1a337b0d0addc - () https://git.kernel.org/stable/c/35afffaddbe8d310dc61659da0b1a337b0d0addc - Patch
References () https://git.kernel.org/stable/c/4903303f25f48b5a1e34e6324c7fae9ccd6b959a - () https://git.kernel.org/stable/c/4903303f25f48b5a1e34e6324c7fae9ccd6b959a - Patch
References () https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f - () https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f - Patch
References () https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5 - () https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5 - Patch

28 Mar 2025, 22:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/35afffaddbe8d310dc61659da0b1a337b0d0addc -
  • () https://git.kernel.org/stable/c/4903303f25f48b5a1e34e6324c7fae9ccd6b959a -

21 Nov 2024, 09:03

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f - () https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f -
References () https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5 - () https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: asegúrese de que exista la cola de descarga TID La ruta del código de reanudación supone que se ha configurado la cola de TX para la descarga de TID. En el momento de la reanudación, intenta sincronizar el puntero de escritura, ya que es posible que el firmware lo haya actualizado. En el caso inusual de que no se hayan enviado paquetes en el TID 0, la cola no se habrá asignado y esto provocará una falla. Solucione este problema asegurándose de que la cola exista en el momento de la suspensión.

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2025-09-18 15:28


NVD link : CVE-2024-27056

Mitre link : CVE-2024-27056

CVE.ORG link : CVE-2024-27056


JSON object : View

Products Affected

linux

  • linux_kernel