CVE-2024-40941

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't read past the mfuart notifcation In case the firmware sends a notification that claims it has more data than it has, we will read past that was allocated for the notification. Remove the print of the buffer, we won't see it by default. If needed, we can see the content with tracing. This was reported by KFENCE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*

History

06 Oct 2025, 20:51

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c - () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c - Patch
References () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 - () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 - Patch
References () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 - () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 - Patch
References () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de - () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de - Patch
References () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 - () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 - Patch
References () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 - () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 - Patch
References () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d - () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d - Patch
References () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 - () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 09:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c - () https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c -
References () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 - () https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7 -
References () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 - () https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4 -
References () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de - () https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de -
References () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 - () https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805 -
References () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 - () https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940 -
References () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d - () https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d -
References () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 - () https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154 -
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: no leer más allá de la notificación mfuart En caso de que el firmware envíe una notificación que dice que tiene más datos de los que tiene, leeremos más allá de los asignados para la notificación. Elimina la impresión del búfer, no la veremos por defecto. Si es necesario, podemos ver el contenido con rastreo. Así lo informó KFENCE.

12 Jul 2024, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-10-06 20:51


NVD link : CVE-2024-40941

Mitre link : CVE-2024-40941

CVE.ORG link : CVE-2024-40941


JSON object : View

Products Affected

linux

  • linux_kernel