跳转到帖子

Ubuntu: (CVE-2024-27056): linux-raspi-realtime vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (CVE-2024-27056): linux-raspi-realtime vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/01/2024
Created
02/12/2025
Added
02/11/2025
Modified
02/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists The resume code path assumes that the TX queue for the offloading TID has been configured. At resume time it then tries to sync the write pointer as it may have been updated by the firmware. In the unusual event that no packets have been send on TID 0, the queue will not have been allocated and this causes a crash. Fix this by ensuring the queue exist at suspend time.

Solution(s)

  • ubuntu-upgrade-linux-raspi-realtime

References

  • https://attackerkb.com/topics/cve-2024-27056
  • CVE - 2024-27056
  • https://git.kernel.org/linus/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f
  • https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f
  • https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5
  • https://www.cve.org/CVERecord?id=CVE-2024-27056
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…