CVE-2024-53191
Severity CVSS v4.0:
Pending analysis
Type:
CWE-415
Double Free
Publication date:
27/12/2024
Last modified:
31/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: ath12k: fix warning when unbinding<br />
<br />
If there is an error during some initialization related to firmware,<br />
the buffers dp->tx_ring[i].tx_status are released.<br />
However this is released again when the device is unbinded (ath12k_pci),<br />
and we get:<br />
WARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80<br />
Call Trace:<br />
free_large_kmalloc<br />
ath12k_dp_free<br />
ath12k_core_deinit<br />
ath12k_pci_remove<br />
...<br />
<br />
The issue is always reproducible from a VM because the MSI addressing<br />
initialization is failing.<br />
<br />
In order to fix the issue, just set the buffers to NULL after releasing in<br />
order to avoid the double free.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3 (including) | 6.6.64 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page