CVE-2024-26779

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit fast-xmit must only be enabled after the sta has been uploaded to the driver, otherwise it could end up passing the not-yet-uploaded sta via drv_tx calls to the driver, leading to potential crashes because of uninitialized drv_priv data. Add a missing sta->uploaded check and re-check fast xmit after inserting a sta.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

04 Apr 2025, 14:15

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9 - () https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9 - Patch
References () https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954 - () https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954 - Patch
References () https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd - () https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd - Patch
References () https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587 - () https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587 - Patch
References () https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5 - () https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5 - Patch
References () https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d - () https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d - Patch
References () https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f - () https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f - Patch
References () https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696 - () https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
First Time Debian debian Linux
Debian
Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*

Information

Published : 2024-04-03 17:15

Updated : 2025-04-04 14:15


NVD link : CVE-2024-26779

Mitre link : CVE-2024-26779

CVE.ORG link : CVE-2024-26779


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')