In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists The resume code path assumes that the TX queue for the offloading TID has been configured. At resume time it then tries to sync the write pointer as it may have been updated by the firmware. In the unusual event that no packets have been send on TID 0, the queue will not have been allocated and this causes a crash. Fix this by ensuring the queue exist at suspend time.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-01T12:54:56.461Z

Updated: 2024-11-05T09:20:49.916Z

Reserved: 2024-02-19T14:20:24.214Z

Link: CVE-2024-27056

cve-icon Vulnrichment

Updated: 2024-06-14T18:56:57.318Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-01T13:15:50.360

Modified: 2024-11-21T09:03:45.980

Link: CVE-2024-27056

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-01T00:00:00Z

Links: CVE-2024-27056 - Bugzilla