{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-40941","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-07-12T12:17:45.587Z","datePublished":"2024-07-12T12:25:16.471Z","dateUpdated":"2025-11-03T21:58:09.834Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:18:26.136Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don't read past the mfuart notifcation\n\nIn case the firmware sends a notification that claims it has more data\nthan it has, we will read past that was allocated for the notification.\nRemove the print of the buffer, we won't see it by default. If needed,\nwe can see the content with tracing.\n\nThis was reported by KFENCE."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/wireless/intel/iwlwifi/mvm/fw.c"],"versions":[{"version":"bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87","lessThan":"15b37c6fab9d5e40ac399fa1c725118588ed649c","status":"affected","versionType":"git"},{"version":"bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87","lessThan":"6532f18e66b384b8d4b7e5c9caca042faaa9e8de","status":"affected","versionType":"git"},{"version":"bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87","lessThan":"46c59a25337049a2a230ce7f7c3b9f21d0aaaad7","status":"affected","versionType":"git"},{"version":"bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87","lessThan":"65686118845d427df27ee83a6ddd4885596b0805","status":"affected","versionType":"git"},{"version":"bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87","lessThan":"a8bc8276af9aeacabb773f0c267cfcdb847c6f2d","status":"affected","versionType":"git"},{"version":"bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87","lessThan":"a05018739a5e6b9dc112c95bd4c59904062c8940","status":"affected","versionType":"git"},{"version":"bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87","lessThan":"acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154","status":"affected","versionType":"git"},{"version":"bdccdb854f2fb473f2ac4a6108df3cbfcedd5a87","lessThan":"4bb95f4535489ed830cf9b34b0a891e384d1aee4","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/wireless/intel/iwlwifi/mvm/fw.c"],"versions":[{"version":"4.12","status":"affected"},{"version":"0","lessThan":"4.12","status":"unaffected","versionType":"semver"},{"version":"4.19.317","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.279","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.221","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.162","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.95","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.35","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.9.6","lessThanOrEqual":"6.9.*","status":"unaffected","versionType":"semver"},{"version":"6.10","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"4.19.317"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"5.4.279"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"5.10.221"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"5.15.162"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"6.1.95"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"6.6.35"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"6.9.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12","versionEndExcluding":"6.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c"},{"url":"https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de"},{"url":"https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7"},{"url":"https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805"},{"url":"https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d"},{"url":"https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940"},{"url":"https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154"},{"url":"https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4"}],"title":"wifi: iwlwifi: mvm: don't read past the mfuart notifcation","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:58:09.834Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-40941","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T17:04:27.174658Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:02.057Z"}}]}}