CVE-2024-40941

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't read past the mfuart notifcation In case the firmware sends a notification that claims it has more data than it has, we will read past that was allocated for the notification. Remove the print of the buffer, we won't see it by default. If needed, we can see the content with tracing. This was reported by KFENCE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*

History

03 Nov 2025, 22:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -

06 Oct 2025, 20:51

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c - () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c - Patch
References () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 - () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 - Patch
References () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 - () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 - Patch
References () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de - () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de - Patch
References () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 - () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 - Patch
References () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 - () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 - Patch
References () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d - () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d - Patch
References () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 - () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 - Patch
First Time Linux
Linux linux Kernel

Information

Published : 2024-07-12 13:15

Updated : 2025-11-03 22:17


NVD link : CVE-2024-40941

Mitre link : CVE-2024-40941

CVE.ORG link : CVE-2024-40941


JSON object : View

Products Affected

linux

  • linux_kernel