Bug 2301475 (CVE-2024-42112) - CVE-2024-42112 kernel: net: txgbe: free isb resources at the right time
Summary: CVE-2024-42112 kernel: net: txgbe: free isb resources at the right time
Keywords:
Status: NEW
Alias: CVE-2024-42112
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2301774
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-07-30 08:31 UTC by OSIDB Bzimport
Modified: 2024-09-23 09:59 UTC (History)
4 users (show)

Fixed In Version: kernel 6.9.9, kernel 6.10
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in the Linux kernel in the txgbe.c driver where the shared interrupts are handled in the device remove routing, before free IRQs. This can cause isb memory to still be read after it is freed, leading to a use-after-free situation which can cause memory corruption or crashes.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-07-30 08:31:08 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: txgbe: free isb resources at the right time

When using MSI/INTx interrupt, the shared interrupts are still being
handled in the device remove routine, before free IRQs. So isb memory
is still read after it is freed. Thus move wx_free_isb_resources()
from txgbe_close() to txgbe_remove(). And fix the improper isb free
action in txgbe_open() error handling path.

Comment 1 Mauro Matteo Cascella 2024-07-30 18:53:04 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024073022-CVE-2024-42112-ee07@gregkh/T

Comment 2 Mauro Matteo Cascella 2024-07-30 18:53:25 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2301774]


Note You need to log in before you can comment on or make changes to this bug.