In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: read txq->read_ptr under lock
If we read txq->read_ptr without lock, we can read the same
value twice, then obtain the lock, and reclaim from there
to two different places, but crucially reclaim the same
entry twice, resulting in the WARN_ONCE() a little later.
Fix that by reading txq->read_ptr under lock.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Sep 2024 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:8 |
Wed, 11 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 16 Aug 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux Redhat rhel Eus |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.2::nfv cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat rhel Eus |
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-30T15:29:16.852Z
Updated: 2024-11-05T09:28:08.549Z
Reserved: 2024-05-30T15:25:07.068Z
Link: CVE-2024-36922
Vulnrichment
Updated: 2024-08-02T03:43:49.981Z
NVD
Status : Awaiting Analysis
Published: 2024-05-30T16:15:15.470
Modified: 2024-11-21T09:22:49.503
Link: CVE-2024-36922
Redhat