Vulnerability Details : CVE-2024-36922
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: read txq->read_ptr under lock
If we read txq->read_ptr without lock, we can read the same
value twice, then obtain the lock, and reclaim from there
to two different places, but crucially reclaim the same
entry twice, resulting in the WARN_ONCE() a little later.
Fix that by reading txq->read_ptr under lock.
Products affected by CVE-2024-36922
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-36922
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
References for CVE-2024-36922
-
https://git.kernel.org/stable/c/c2ace6300600c634553657785dfe5ea0ed688ac2
wifi: iwlwifi: read txq->read_ptr under lock - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/b83db8e756dec68a950ed2f056248b1704b3deaa
wifi: iwlwifi: read txq->read_ptr under lock - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/43d07103df670484cdd26f9588eabef80f69db89
wifi: iwlwifi: read txq->read_ptr under lock - kernel/git/stable/linux.git - Linux kernel stable tree
Jump to