CVE-2024-26892
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
17/04/2024
Last modified:
14/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: mt76: mt7921e: fix use-after-free in free_irq()<br />
<br />
From commit a304e1b82808 ("[PATCH] Debug shared irqs"), there is a test<br />
to make sure the shared irq handler should be able to handle the unexpected<br />
event after deregistration. For this case, let&#39;s apply MT76_REMOVED flag to<br />
indicate the device was removed and do not run into the resource access<br />
anymore.<br />
<br />
BUG: KASAN: use-after-free in mt7921_irq_handler+0xd8/0x100 [mt7921e]<br />
Read of size 8 at addr ffff88824a7d3b78 by task rmmod/11115<br />
CPU: 28 PID: 11115 Comm: rmmod Tainted: G W L 5.17.0 #10<br />
Hardware name: Micro-Star International Co., Ltd. MS-7D73/MPG B650I<br />
EDGE WIFI (MS-7D73), BIOS 1.81 01/05/2024<br />
Call Trace:<br />
<br />
dump_stack_lvl+0x6f/0xa0<br />
print_address_description.constprop.0+0x1f/0x190<br />
? mt7921_irq_handler+0xd8/0x100 [mt7921e]<br />
? mt7921_irq_handler+0xd8/0x100 [mt7921e]<br />
kasan_report.cold+0x7f/0x11b<br />
? mt7921_irq_handler+0xd8/0x100 [mt7921e]<br />
mt7921_irq_handler+0xd8/0x100 [mt7921e]<br />
free_irq+0x627/0xaa0<br />
devm_free_irq+0x94/0xd0<br />
? devm_request_any_context_irq+0x160/0x160<br />
? kobject_put+0x18d/0x4a0<br />
mt7921_pci_remove+0x153/0x190 [mt7921e]<br />
pci_device_remove+0xa2/0x1d0<br />
__device_release_driver+0x346/0x6e0<br />
driver_detach+0x1ef/0x2c0<br />
bus_remove_driver+0xe7/0x2d0<br />
? __check_object_size+0x57/0x310<br />
pci_unregister_driver+0x26/0x250<br />
__do_sys_delete_module+0x307/0x510<br />
? free_module+0x6a0/0x6a0<br />
? fpregs_assert_state_consistent+0x4b/0xb0<br />
? rcu_read_lock_sched_held+0x10/0x70<br />
? syscall_enter_from_user_mode+0x20/0x70<br />
? trace_hardirqs_on+0x1c/0x130<br />
do_syscall_64+0x5c/0x80<br />
? trace_hardirqs_on_prepare+0x72/0x160<br />
? do_syscall_64+0x68/0x80<br />
? trace_hardirqs_on_prepare+0x72/0x160<br />
entry_SYSCALL_64_after_hwframe+0x44/0xae
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2.15 (including) | 6.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3.2 (including) | 6.6.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/bfe1adf1606f76c180324e53b130f0e76d5cc6c3
- https://git.kernel.org/stable/c/bfeaef901194c5923ce3330272786eff2fac513a
- https://git.kernel.org/stable/c/c7dd42fbebcfb02bef070fd48f774d6412d0b49d
- https://git.kernel.org/stable/c/c957280ef6ab6bdf559a91ae693a6b34310697e3
- https://git.kernel.org/stable/c/bfe1adf1606f76c180324e53b130f0e76d5cc6c3
- https://git.kernel.org/stable/c/bfeaef901194c5923ce3330272786eff2fac513a
- https://git.kernel.org/stable/c/c7dd42fbebcfb02bef070fd48f774d6412d0b49d
- https://git.kernel.org/stable/c/c957280ef6ab6bdf559a91ae693a6b34310697e3



