THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)

Ok

PUBLISHED

CVE-2024-27391

wifi: wilc1000: do not realloc workqueue everytime an interface is added

Reserved:2024-02-25
Published:2024-05-01
Updated:2024-05-13

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: do not realloc workqueue everytime an interface is added Commit 09ed8bfc5215 ("wilc1000: Rename workqueue from "WILC_wq" to "NETDEV-wq"") moved workqueue creation in wilc_netdev_ifc_init in order to set the interface name in the workqueue name. However, while the driver needs only one workqueue, the wilc_netdev_ifc_init is called each time we add an interface over a phy, which in turns overwrite the workqueue with a new one. This can be observed with the following commands: for i in $(seq 0 10) do iw phy phy0 interface add wlan1 type managed iw dev wlan1 del done ps -eo pid,comm|grep wlan 39 kworker/R-wlan0 98 kworker/R-wlan1 102 kworker/R-wlan1 105 kworker/R-wlan1 108 kworker/R-wlan1 111 kworker/R-wlan1 114 kworker/R-wlan1 117 kworker/R-wlan1 120 kworker/R-wlan1 123 kworker/R-wlan1 126 kworker/R-wlan1 129 kworker/R-wlan1 Fix this leakage by putting back hif_workqueue allocation in wilc_cfg80211_init. Regarding the workqueue name, it is indeed relevant to set it lowercase, however it is not attached to a specific netdev, so enforcing netdev name in the name is not so relevant. Still, enrich the name with the wiphy name to make it clear which phy is using the workqueue.

Product status

Default status
unaffected

09ed8bfc5215 before 515cc676dfbc
affected

09ed8bfc5215 before 4041c60a9d54
affected

09ed8bfc5215 before 90ae293d1d25
affected

09ed8bfc5215 before 9ab0c303ccab
affected

09ed8bfc5215 before 328efda22af8
affected

Default status
affected

5.17
affected

Any version before 5.17
unaffected

6.1.83
unaffected

6.6.23
unaffected

6.7.11
unaffected

6.8.2
unaffected

6.9
unaffected

References

https://git.kernel.org/stable/c/515cc676dfbce40d93c92b1ff3c1070e917f4e52

https://git.kernel.org/stable/c/4041c60a9d543b3ad50225385b072ba68e96166e

https://git.kernel.org/stable/c/90ae293d1d255f622318fce6eeea2e18f9fde5c1

https://git.kernel.org/stable/c/9ab0c303ccabfd6bdce14432792d41090070008c

https://git.kernel.org/stable/c/328efda22af81130c2ad981c110518cb29ff2f1d

cve.org CVE-2024-27391

nvd.nist.gov CVE-2024-27391

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-27391