CVE-2024-53191

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix warning when unbinding If there is an error during some initialization related to firmware, the buffers dp->tx_ring[i].tx_status are released. However this is released again when the device is unbinded (ath12k_pci), and we get: WARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80 Call Trace: free_large_kmalloc ath12k_dp_free ath12k_core_deinit ath12k_pci_remove ... The issue is always reproducible from a VM because the MSI addressing initialization is failing. In order to fix the issue, just set the buffers to NULL after releasing in order to avoid the double free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Jan 2025, 16:00

Type Values Removed Values Added
CWE CWE-415
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: corregir advertencia al desvincular Si hay un error durante alguna inicialización relacionada con el firmware, se liberan los búferes dp->tx_ring[i].tx_status. Sin embargo, esto se libera nuevamente cuando se desvincula el dispositivo (ath12k_pci), y obtenemos: ADVERTENCIA: CPU: 0 PID: 2098 en mm/slub.c:4689 free_large_kmalloc+0x4d/0x80 Rastreo de llamadas: free_large_kmalloc ath12k_dp_free ath12k_core_deinit ath12k_pci_remove ... El problema siempre se puede reproducir desde una VM porque la inicialización de la dirección MSI está fallando. Para solucionar el problema, simplemente configure los búferes en NULL después de liberar para evitar la doble liberación.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/223b546c6222d42147eff034433002ca5e2e7e09 - () https://git.kernel.org/stable/c/223b546c6222d42147eff034433002ca5e2e7e09 - Patch
References () https://git.kernel.org/stable/c/90556b96338aa6037cd26dac857327fda7c19732 - () https://git.kernel.org/stable/c/90556b96338aa6037cd26dac857327fda7c19732 - Patch
References () https://git.kernel.org/stable/c/94c9100b600f05a36b33f9ed76dbd6fb0eb25386 - () https://git.kernel.org/stable/c/94c9100b600f05a36b33f9ed76dbd6fb0eb25386 - Patch
References () https://git.kernel.org/stable/c/ca68ce0d9f4bcd032fd1334441175ae399642a06 - () https://git.kernel.org/stable/c/ca68ce0d9f4bcd032fd1334441175ae399642a06 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

27 Dec 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 14:15

Updated : 2025-01-31 16:00


NVD link : CVE-2024-53191

Mitre link : CVE-2024-53191

CVE.ORG link : CVE-2024-53191


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free