In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix warning when unbinding
If there is an error during some initialization related to firmware,
the buffers dp->tx_ring[i].tx_status are released.
However this is released again when the device is unbinded (ath12k_pci),
and we get:
WARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80
Call Trace:
free_large_kmalloc
ath12k_dp_free
ath12k_core_deinit
ath12k_pci_remove
...
The issue is always reproducible from a VM because the MSI addressing
initialization is failing.
In order to fix the issue, just set the buffers to NULL after releasing in
order to avoid the double free.
References
Configurations
Configuration 1 (hide)
|
History
31 Jan 2025, 16:00
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-415 | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/223b546c6222d42147eff034433002ca5e2e7e09 - Patch | |
References | () https://git.kernel.org/stable/c/90556b96338aa6037cd26dac857327fda7c19732 - Patch | |
References | () https://git.kernel.org/stable/c/94c9100b600f05a36b33f9ed76dbd6fb0eb25386 - Patch | |
References | () https://git.kernel.org/stable/c/ca68ce0d9f4bcd032fd1334441175ae399642a06 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
27 Dec 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 14:15
Updated : 2025-01-31 16:00
NVD link : CVE-2024-53191
Mitre link : CVE-2024-53191
CVE.ORG link : CVE-2024-53191
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free