Bug 2307889 (CVE-2024-44932) - CVE-2024-44932 kernel: idpf: fix UAFs when destroying the queues
Summary: CVE-2024-44932 kernel: idpf: fix UAFs when destroying the queues
Keywords:
Status: NEW
Alias: CVE-2024-44932
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2308132
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-08-26 11:21 UTC by OSIDB Bzimport
Modified: 2025-05-13 08:27 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:6966 0 None None None 2025-05-13 08:27:50 UTC

Description OSIDB Bzimport 2024-08-26 11:21:52 UTC
In the Linux kernel, the following vulnerability has been resolved:

idpf: fix UAFs when destroying the queues

The second tagged commit started sometimes (very rarely, but possible)
throwing WARNs from
net/core/page_pool.c:page_pool_disable_direct_recycling().
Turned out idpf frees interrupt vectors with embedded NAPIs *before*
freeing the queues making page_pools' NAPI pointers lead to freed
memory before these pools are destroyed by libeth.
It's not clear whether there are other accesses to the freed vectors
when destroying the queues, but anyway, we usually free queue/interrupt
vectors only when the queues are destroyed and the NAPIs are guaranteed
to not be referenced anywhere.

Invert the allocation and freeing logic making queue/interrupt vectors
be allocated first and freed last. Vectors don't require queues to be
present, so this is safe. Additionally, this change allows to remove
that useless queue->q_vector pointer cleanup, as vectors are still
valid when freeing the queues (+ both are freed within one function,
so it's not clear why nullify the pointers at all).

Comment 1 Mauro Matteo Cascella 2024-08-27 12:09:14 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024082638-CVE-2024-44932-2659@gregkh/T

Comment 3 errata-xmlrpc 2025-05-13 08:27:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:6966 https://access.redhat.com/errata/RHSA-2025:6966


Note You need to log in before you can comment on or make changes to this bug.