CVE-2024-26779

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit fast-xmit must only be enabled after the sta has been uploaded to the driver, otherwise it could end up passing the not-yet-uploaded sta via drv_tx calls to the driver, leading to potential crashes because of uninitialized drv_priv data. Add a missing sta->uploaded check and re-check fast xmit after inserting a sta.
Configurations

No configuration.

History

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9 - () https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9 -
References () https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954 - () https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954 -
References () https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd - () https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd -
References () https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587 - () https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587 -
References () https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5 - () https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5 -
References () https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d - () https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d -
References () https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f - () https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f -
References () https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696 - () https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696 -

06 Nov 2024, 22:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-362

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige la condición de ejecución al habilitar fast-xmit fast-xmit solo debe habilitarse después de que el sta se haya cargado en el controlador; de lo contrario, podría terminar pasando el error sta aún cargada a través de llamadas drv_tx al controlador, lo que genera posibles fallas debido a datos drv_priv no inicializados. Agregue una estación faltante->comprobación cargada y vuelva a verificar la transmisión rápida después de insertar una estación.

03 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 17:15

Updated : 2024-11-21 09:03


NVD link : CVE-2024-26779

Mitre link : CVE-2024-26779

CVE.ORG link : CVE-2024-26779


JSON object : View

Products Affected

No product.

CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')