Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-26892
HistoryApr 17, 2024 - 12:00 a.m.

CVE-2024-26892

2024-04-1700:00:00
ubuntu.com
ubuntu.com
6
linux kernel; wifi; mt76; mt7921e; use-after-free vulnerability; cve-2024-26892; security issue; patch; removed device; resource access; irq handler; kasan error; hardware name; bios version

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.1%

In the Linux kernel, the following vulnerability has been resolved: wifi:
mt76: mt7921e: fix use-after-free in free_irq() From commit a304e1b82808
(“[PATCH] Debug shared irqs”), there is a test to make sure the shared irq
handler should be able to handle the unexpected event after deregistration.
For this case, let’s apply MT76_REMOVED flag to indicate the device was
removed and do not run into the resource access anymore. BUG: KASAN:
use-after-free in mt7921_irq_handler+0xd8/0x100 [mt7921e] Read of size 8 at
addr ffff88824a7d3b78 by task rmmod/11115 CPU: 28 PID: 11115 Comm: rmmod
Tainted: G W L 5.17.0 #10 Hardware name: Micro-Star International Co., Ltd.
MS-7D73/MPG B650I EDGE WIFI (MS-7D73), BIOS 1.81 01/05/2024 Call Trace:
<TASK> dump_stack_lvl+0x6f/0xa0
print_address_description.constprop.0+0x1f/0x190 ?
mt7921_irq_handler+0xd8/0x100 [mt7921e] ? mt7921_irq_handler+0xd8/0x100
[mt7921e] kasan_report.cold+0x7f/0x11b ? mt7921_irq_handler+0xd8/0x100
[mt7921e] mt7921_irq_handler+0xd8/0x100 [mt7921e] free_irq+0x627/0xaa0
devm_free_irq+0x94/0xd0 ? devm_request_any_context_irq+0x160/0x160 ?
kobject_put+0x18d/0x4a0 mt7921_pci_remove+0x153/0x190 [mt7921e]
pci_device_remove+0xa2/0x1d0 __device_release_driver+0x346/0x6e0
driver_detach+0x1ef/0x2c0 bus_remove_driver+0xe7/0x2d0 ?
__check_object_size+0x57/0x310 pci_unregister_driver+0x26/0x250
__do_sys_delete_module+0x307/0x510 ? free_module+0x6a0/0x6a0 ?
fpregs_assert_state_consistent+0x4b/0xb0 ?
rcu_read_lock_sched_held+0x10/0x70 ? syscall_enter_from_user_mode+0x20/0x70
? trace_hardirqs_on+0x1c/0x130 do_syscall_64+0x5c/0x80 ?
trace_hardirqs_on_prepare+0x72/0x160 ? do_syscall_64+0x68/0x80 ?
trace_hardirqs_on_prepare+0x72/0x160
entry_SYSCALL_64_after_hwframe+0x44/0xae

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.1%

Related for UB:CVE-2024-26892