First published: Wed Oct 09 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead There is a WARNING in iwl_trans_wait_tx_queues_empty() (that was recently converted from just a message), that can be hit if we wait for TX queues to become empty after firmware died. Clearly, we can't expect anything from the firmware after it's declared dead. Don't call iwl_trans_wait_tx_queues_empty() in this case. While it could be a good idea to stop the flow earlier, the flush functions do some maintenance work that is not related to the firmware, so keep that part of the code running even when the firmware is not running. [edit commit message]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.10.227<6.1.112 | |
Linux Kernel | >=6.2<6.6.53 | |
Linux Kernel | >=6.7<6.10.12 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
Linux Kernel | =6.11-rc4 | |
Linux Kernel | =6.11-rc5 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47672 is a vulnerability in the Linux kernel's iwlwifi driver that triggers warnings when waiting for transmission queues if the firmware becomes unresponsive.
The severity of CVE-2024-47672 is categorized as moderate due to potential disruptions in wireless communication.
To fix CVE-2024-47672, update your Linux kernel to a patched version such as 6.1.123-1 or later.
CVE-2024-47672 affects Linux kernel versions between 5.10.227 and 6.11-rc5, including specific releases within those ranges.
Failing to address CVE-2024-47672 may lead to warnings being displayed and potential issues with transmission in wireless communications.