CVE-2024-40941

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't read past the mfuart notifcation In case the firmware sends a notification that claims it has more data than it has, we will read past that was allocated for the notification. Remove the print of the buffer, we won't see it by default. If needed, we can see the content with tracing. This was reported by KFENCE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*

History

03 Nov 2025, 22:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -

06 Oct 2025, 20:51

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c - () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c - Patch
References () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 - () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 - Patch
References () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 - () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 - Patch
References () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de - () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de - Patch
References () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 - () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 - Patch
References () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 - () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 - Patch
References () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d - () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d - Patch
References () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 - () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 - Patch

21 Nov 2024, 09:31

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: no leer más allá de la notificación mfuart En caso de que el firmware envíe una notificación que dice que tiene más datos de los que tiene, leeremos más allá de los asignados para la notificación. Elimina la impresión del búfer, no la veremos por defecto. Si es necesario, podemos ver el contenido con rastreo. Así lo informó KFENCE.
References () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c - () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c -
References () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 - () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 -
References () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 - () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 -
References () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de - () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de -
References () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 - () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 -
References () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 - () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 -
References () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d - () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d -
References () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 - () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 -

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-11-03 22:17


NVD link : CVE-2024-40941

Mitre link : CVE-2024-40941

CVE.ORG link : CVE-2024-40941


JSON object : View

Products Affected

linux

  • linux_kernel