CVE-2024-26892

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
17/04/2024
Last modified:
14/01/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mt76: mt7921e: fix use-after-free in free_irq()<br /> <br /> From commit a304e1b82808 ("[PATCH] Debug shared irqs"), there is a test<br /> to make sure the shared irq handler should be able to handle the unexpected<br /> event after deregistration. For this case, let&amp;#39;s apply MT76_REMOVED flag to<br /> indicate the device was removed and do not run into the resource access<br /> anymore.<br /> <br /> BUG: KASAN: use-after-free in mt7921_irq_handler+0xd8/0x100 [mt7921e]<br /> Read of size 8 at addr ffff88824a7d3b78 by task rmmod/11115<br /> CPU: 28 PID: 11115 Comm: rmmod Tainted: G W L 5.17.0 #10<br /> Hardware name: Micro-Star International Co., Ltd. MS-7D73/MPG B650I<br /> EDGE WIFI (MS-7D73), BIOS 1.81 01/05/2024<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x6f/0xa0<br /> print_address_description.constprop.0+0x1f/0x190<br /> ? mt7921_irq_handler+0xd8/0x100 [mt7921e]<br /> ? mt7921_irq_handler+0xd8/0x100 [mt7921e]<br /> kasan_report.cold+0x7f/0x11b<br /> ? mt7921_irq_handler+0xd8/0x100 [mt7921e]<br /> mt7921_irq_handler+0xd8/0x100 [mt7921e]<br /> free_irq+0x627/0xaa0<br /> devm_free_irq+0x94/0xd0<br /> ? devm_request_any_context_irq+0x160/0x160<br /> ? kobject_put+0x18d/0x4a0<br /> mt7921_pci_remove+0x153/0x190 [mt7921e]<br /> pci_device_remove+0xa2/0x1d0<br /> __device_release_driver+0x346/0x6e0<br /> driver_detach+0x1ef/0x2c0<br /> bus_remove_driver+0xe7/0x2d0<br /> ? __check_object_size+0x57/0x310<br /> pci_unregister_driver+0x26/0x250<br /> __do_sys_delete_module+0x307/0x510<br /> ? free_module+0x6a0/0x6a0<br /> ? fpregs_assert_state_consistent+0x4b/0xb0<br /> ? rcu_read_lock_sched_held+0x10/0x70<br /> ? syscall_enter_from_user_mode+0x20/0x70<br /> ? trace_hardirqs_on+0x1c/0x130<br /> do_syscall_64+0x5c/0x80<br /> ? trace_hardirqs_on_prepare+0x72/0x160<br /> ? do_syscall_64+0x68/0x80<br /> ? trace_hardirqs_on_prepare+0x72/0x160<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2.15 (including) 6.3 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.3.2 (including) 6.6.23 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.8.2 (excluding)