CVE-2024-47672

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead There is a WARNING in iwl_trans_wait_tx_queues_empty() (that was recently converted from just a message), that can be hit if we wait for TX queues to become empty after firmware died. Clearly, we can't expect anything from the firmware after it's declared dead. Don't call iwl_trans_wait_tx_queues_empty() in this case. While it could be a good idea to stop the flow earlier, the flush functions do some maintenance work that is not related to the firmware, so keep that part of the code running even when the firmware is not running. [edit commit message]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/16c1e5d5228f26f120e12e6ca55c59c3a5e6dece -
  • () https://git.kernel.org/stable/c/ad2fcc2daa203a6ad491f00e9ae3b7867e8fe0f3 -

23 Oct 2024, 19:44

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1afed66cb271b3e65fe9df1c9fba2bf4b1f55669 - () https://git.kernel.org/stable/c/1afed66cb271b3e65fe9df1c9fba2bf4b1f55669 - Patch
References () https://git.kernel.org/stable/c/3a84454f5204718ca5b4ad2c1f0bf2031e2403d1 - () https://git.kernel.org/stable/c/3a84454f5204718ca5b4ad2c1f0bf2031e2403d1 - Patch
References () https://git.kernel.org/stable/c/7188b7a72320367554b76d8f298417b070b05dd3 - () https://git.kernel.org/stable/c/7188b7a72320367554b76d8f298417b070b05dd3 - Patch
References () https://git.kernel.org/stable/c/1b0cd832c9607f41f84053b818e0b7908510a3b9 - () https://git.kernel.org/stable/c/1b0cd832c9607f41f84053b818e0b7908510a3b9 - Patch
References () https://git.kernel.org/stable/c/4d0a900ec470d392476c428875dbf053f8a0ae5e - () https://git.kernel.org/stable/c/4d0a900ec470d392476c428875dbf053f8a0ae5e - Patch
References () https://git.kernel.org/stable/c/de46b1d24f5f752b3bd8b46673c2ea4239661244 - () https://git.kernel.org/stable/c/de46b1d24f5f752b3bd8b46673c2ea4239661244 - Patch

17 Oct 2024, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/1afed66cb271b3e65fe9df1c9fba2bf4b1f55669 -
  • () https://git.kernel.org/stable/c/de46b1d24f5f752b3bd8b46673c2ea4239661244 -

09 Oct 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-09 15:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-47672

Mitre link : CVE-2024-47672


JSON object : View

Products Affected

linux

  • linux_kernel