We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-27391

wifi: wilc1000: do not realloc workqueue everytime an interface is added



Description

In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: do not realloc workqueue everytime an interface is added Commit 09ed8bfc5215 ("wilc1000: Rename workqueue from "WILC_wq" to "NETDEV-wq"") moved workqueue creation in wilc_netdev_ifc_init in order to set the interface name in the workqueue name. However, while the driver needs only one workqueue, the wilc_netdev_ifc_init is called each time we add an interface over a phy, which in turns overwrite the workqueue with a new one. This can be observed with the following commands: for i in $(seq 0 10) do iw phy phy0 interface add wlan1 type managed iw dev wlan1 del done ps -eo pid,comm|grep wlan 39 kworker/R-wlan0 98 kworker/R-wlan1 102 kworker/R-wlan1 105 kworker/R-wlan1 108 kworker/R-wlan1 111 kworker/R-wlan1 114 kworker/R-wlan1 117 kworker/R-wlan1 120 kworker/R-wlan1 123 kworker/R-wlan1 126 kworker/R-wlan1 129 kworker/R-wlan1 Fix this leakage by putting back hif_workqueue allocation in wilc_cfg80211_init. Regarding the workqueue name, it is indeed relevant to set it lowercase, however it is not attached to a specific netdev, so enforcing netdev name in the name is not so relevant. Still, enrich the name with the wiphy name to make it clear which phy is using the workqueue.

Reserved 2024-02-25 | Published 2024-05-01 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

09ed8bfc5215ad5aac91c50008277b5586b9ef24 before 515cc676dfbce40d93c92b1ff3c1070e917f4e52
affected

09ed8bfc5215ad5aac91c50008277b5586b9ef24 before 4041c60a9d543b3ad50225385b072ba68e96166e
affected

09ed8bfc5215ad5aac91c50008277b5586b9ef24 before 90ae293d1d255f622318fce6eeea2e18f9fde5c1
affected

09ed8bfc5215ad5aac91c50008277b5586b9ef24 before 9ab0c303ccabfd6bdce14432792d41090070008c
affected

09ed8bfc5215ad5aac91c50008277b5586b9ef24 before 328efda22af81130c2ad981c110518cb29ff2f1d
affected

Default status
affected

5.17
affected

Any version before 5.17
unaffected

6.1.83
unaffected

6.6.23
unaffected

6.7.11
unaffected

6.8.2
unaffected

6.9
unaffected

References

git.kernel.org/...c/515cc676dfbce40d93c92b1ff3c1070e917f4e52

git.kernel.org/...c/4041c60a9d543b3ad50225385b072ba68e96166e

git.kernel.org/...c/90ae293d1d255f622318fce6eeea2e18f9fde5c1

git.kernel.org/...c/9ab0c303ccabfd6bdce14432792d41090070008c

git.kernel.org/...c/328efda22af81130c2ad981c110518cb29ff2f1d

cve.org (CVE-2024-27391)

nvd.nist.gov (CVE-2024-27391)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-27391

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.