In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mvm: ensure offloading TID queue exists
The resume code path assumes that the TX queue for the offloading TID
has been configured. At resume time it then tries to sync the write
pointer as it may have been updated by the firmware.
In the unusual event that no packets have been send on TID 0, the queue
will not have been allocated and this causes a crash. Fix this by
ensuring the queue exist at suspend time.
References
Configurations
Configuration 1 (hide)
|
History
18 Sep 2025, 15:28
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/35afffaddbe8d310dc61659da0b1a337b0d0addc - Patch | |
References | () https://git.kernel.org/stable/c/4903303f25f48b5a1e34e6324c7fae9ccd6b959a - Patch | |
References | () https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f - Patch | |
References | () https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5 - Patch |
28 Mar 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f - | |
References | () https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5 - | |
Summary |
|
01 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 13:15
Updated : 2025-09-18 15:28
NVD link : CVE-2024-27056
Mitre link : CVE-2024-27056
CVE.ORG link : CVE-2024-27056
JSON object : View
Products Affected
linux
- linux_kernel
CWE