In the Linux kernel, the following vulnerability has been resolved:
idpf: fix UAFs when destroying the queues
The second tagged commit started sometimes (very rarely, but possible)
throwing WARNs from
net/core/page_pool.c:page_pool_disable_direct_recycling().
Turned out idpf frees interrupt vectors with embedded NAPIs *before*
freeing the queues making page_pools' NAPI pointers lead to freed
memory before these pools are destroyed by libeth.
It's not clear whether there are other accesses to the freed vectors
when destroying the queues, but anyway, we usually free queue/interrupt
vectors only when the queues are destroyed and the NAPIs are guaranteed
to not be referenced anywhere.
Invert the allocation and freeing logic making queue/interrupt vectors
be allocated first and freed last. Vectors don't require queues to be
present, so this is safe. Additionally, this change allows to remove
that useless queue->q_vector pointer cleanup, as vectors are still
valid when freeing the queues (+ both are freed within one function,
so it's not clear why nullify the pointers at all).
References
Configurations
Configuration 1 (hide)
|
History
27 Aug 2024, 16:08
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/290f1c033281c1a502a3cd1c53c3a549259c491f - Patch | |
References | () https://git.kernel.org/stable/c/3cde714b0e77206ed1b5cf31f28c18ba9ae946fd - Patch | |
Summary |
|
26 Aug 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-26 11:15
Updated : 2024-08-27 16:08
NVD link : CVE-2024-44932
Mitre link : CVE-2024-44932
CVE.ORG link : CVE-2024-44932
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free