First published: Fri Jul 12 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't read past the mfuart notifcation In case the firmware sends a notification that claims it has more data than it has, we will read past that was allocated for the notification. Remove the print of the buffer, we won't see it by default. If needed, we can see the content with tracing. This was reported by KFENCE.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.19.317 | 4.19.317 |
redhat/kernel | <5.4.279 | 5.4.279 |
redhat/kernel | <5.10.221 | 5.10.221 |
redhat/kernel | <5.15.162 | 5.15.162 |
redhat/kernel | <6.1.95 | 6.1.95 |
redhat/kernel | <6.6.35 | 6.6.35 |
redhat/kernel | <6.9.6 | 6.9.6 |
redhat/kernel | <6.10 | 6.10 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 | |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40941 has a high severity rating due to its potential for memory corruption leading to system instability.
To fix CVE-2024-40941, update to the latest kernel versions provided by your distribution, such as 4.19.317, 5.4.279, or 6.10.
CVE-2024-40941 affects various distributions of the Linux kernel, specifically those prior to the specified remedied versions.
CVE-2024-40941 could potentially be exploited remotely if an attacker can send crafted notifications to a vulnerable system.
There is no known workaround for CVE-2024-40941; applying the patch or upgrading the kernel is necessary to mitigate the risk.