![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-35938 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: decrease MHI channel buffer length to 8KB Currently
buf_len field of ath11k_mhi_config_qca6390 is assigned with 0, making
MHI use a default size, 64KB, to allocate channel buffers. This is
likely to fail in some scenarios where system memory is highly
fragmented and memory compaction or reclaim is not allowed. There is a
fail report which is caused by it: kworker/u32:45: page allocation
failure: order:4, mode:0x40c00(GFP_NOIO|__GFP_COMP),
nodemask=(null),cpuset=/,mems_allowed=0 CPU: 0 PID: 19318 Comm:
kworker/u32:45 Not tainted 6.8.0-rc3-1.gae4495f-default #1 openSUSE
Tumbleweed (unreleased) 493b6d5b382c603654d7a81fc3c144d59a1dfceb
Workqueue: events_unbound async_run_entry_fn Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-35938 https://git.kernel.org/stable/c/138fdeac75fb7512a7f9f1c3b236cd2e754af793 https://git.kernel.org/stable/c/138fdeac75fb7512a7f9f1c3b236cd2e754af793 https://git.kernel.org/stable/c/1cca1bddf9ef080503c15378cecf4877f7510015 https://git.kernel.org/stable/c/1cca1bddf9ef080503c15378cecf4877f7510015 https://git.kernel.org/stable/c/6597a6687af54e2cb58371cf8f6ee4dd85c537de https://git.kernel.org/stable/c/6597a6687af54e2cb58371cf8f6ee4dd85c537de https://git.kernel.org/stable/c/805a1cdde82fec00c7471a393f4bb437b2741559 https://git.kernel.org/stable/c/805a1cdde82fec00c7471a393f4bb437b2741559 https://git.kernel.org/stable/c/ae5876b3b7b2243d874e2afa099e7926122087a1 https://git.kernel.org/stable/c/ae5876b3b7b2243d874e2afa099e7926122087a1 |