In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mvm: ensure offloading TID queue exists
The resume code path assumes that the TX queue for the offloading TID
has been configured. At resume time it then tries to sync the write
pointer as it may have been updated by the firmware.
In the unusual event that no packets have been send on TID 0, the queue
will not have been allocated and this causes a crash. Fix this by
ensuring the queue exist at suspend time.
References
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Sep 2025, 15:28
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/35afffaddbe8d310dc61659da0b1a337b0d0addc - Patch | |
| References | () https://git.kernel.org/stable/c/4903303f25f48b5a1e34e6324c7fae9ccd6b959a - Patch | |
| References | () https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f - Patch | |
| References | () https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5 - Patch | |
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
28 Mar 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-05-01 13:15
Updated : 2025-11-03 20:16
NVD link : CVE-2024-27056
Mitre link : CVE-2024-27056
CVE.ORG link : CVE-2024-27056
JSON object : View
Products Affected
linux
- linux_kernel
CWE
