CVE-2024-26779

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit fast-xmit must only be enabled after the sta has been uploaded to the driver, otherwise it could end up passing the not-yet-uploaded sta via drv_tx calls to the driver, leading to potential crashes because of uninitialized drv_priv data. Add a missing sta->uploaded check and re-check fast xmit after inserting a sta.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

04 Apr 2025, 14:15

Type Values Removed Values Added
First Time Debian
Linux linux Kernel
Debian debian Linux
Linux
References () https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9 - () https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9 - Patch
References () https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954 - () https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954 - Patch
References () https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd - () https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd - Patch
References () https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587 - () https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587 - Patch
References () https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5 - () https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5 - Patch
References () https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d - () https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d - Patch
References () https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f - () https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f - Patch
References () https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696 - () https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9 - () https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9 -
References () https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954 - () https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954 -
References () https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd - () https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd -
References () https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587 - () https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587 -
References () https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5 - () https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5 -
References () https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d - () https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d -
References () https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f - () https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f -
References () https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696 - () https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696 -

06 Nov 2024, 22:35

Type Values Removed Values Added
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

03 Apr 2024, 17:24

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 17:15

Updated : 2025-04-04 14:15


NVD link : CVE-2024-26779

Mitre link : CVE-2024-26779

CVE.ORG link : CVE-2024-26779


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')