CVE-2024-27391
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2024
Last modified:
18/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: wilc1000: do not realloc workqueue everytime an interface is added<br />
<br />
Commit 09ed8bfc5215 ("wilc1000: Rename workqueue from "WILC_wq" to<br />
"NETDEV-wq"") moved workqueue creation in wilc_netdev_ifc_init in order to<br />
set the interface name in the workqueue name. However, while the driver<br />
needs only one workqueue, the wilc_netdev_ifc_init is called each time we<br />
add an interface over a phy, which in turns overwrite the workqueue with a<br />
new one. This can be observed with the following commands:<br />
<br />
for i in $(seq 0 10)<br />
do<br />
iw phy phy0 interface add wlan1 type managed<br />
iw dev wlan1 del<br />
done<br />
ps -eo pid,comm|grep wlan<br />
<br />
39 kworker/R-wlan0<br />
98 kworker/R-wlan1<br />
102 kworker/R-wlan1<br />
105 kworker/R-wlan1<br />
108 kworker/R-wlan1<br />
111 kworker/R-wlan1<br />
114 kworker/R-wlan1<br />
117 kworker/R-wlan1<br />
120 kworker/R-wlan1<br />
123 kworker/R-wlan1<br />
126 kworker/R-wlan1<br />
129 kworker/R-wlan1<br />
<br />
Fix this leakage by putting back hif_workqueue allocation in<br />
wilc_cfg80211_init. Regarding the workqueue name, it is indeed relevant to<br />
set it lowercase, however it is not attached to a specific netdev, so<br />
enforcing netdev name in the name is not so relevant. Still, enrich the<br />
name with the wiphy name to make it clear which phy is using the workqueue.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 6.1.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/328efda22af81130c2ad981c110518cb29ff2f1d
- https://git.kernel.org/stable/c/4041c60a9d543b3ad50225385b072ba68e96166e
- https://git.kernel.org/stable/c/515cc676dfbce40d93c92b1ff3c1070e917f4e52
- https://git.kernel.org/stable/c/90ae293d1d255f622318fce6eeea2e18f9fde5c1
- https://git.kernel.org/stable/c/9ab0c303ccabfd6bdce14432792d41090070008c
- https://git.kernel.org/stable/c/328efda22af81130c2ad981c110518cb29ff2f1d
- https://git.kernel.org/stable/c/4041c60a9d543b3ad50225385b072ba68e96166e
- https://git.kernel.org/stable/c/515cc676dfbce40d93c92b1ff3c1070e917f4e52
- https://git.kernel.org/stable/c/90ae293d1d255f622318fce6eeea2e18f9fde5c1
- https://git.kernel.org/stable/c/9ab0c303ccabfd6bdce14432792d41090070008c



