Bug 2334362 (CVE-2024-53191) - CVE-2024-53191 kernel: wifi: ath12k: fix warning when unbinding
Summary: CVE-2024-53191 kernel: wifi: ath12k: fix warning when unbinding
Keywords:
Status: NEW
Alias: CVE-2024-53191
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-12-27 14:01 UTC by OSIDB Bzimport
Modified: 2025-02-01 14:33 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-12-27 14:01:57 UTC
In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix warning when unbinding

If there is an error during some initialization related to firmware,
the buffers dp->tx_ring[i].tx_status are released.
However this is released again when the device is unbinded (ath12k_pci),
and we get:
WARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80
Call Trace:
free_large_kmalloc
ath12k_dp_free
ath12k_core_deinit
ath12k_pci_remove
...

The issue is always reproducible from a VM because the MSI addressing
initialization is failing.

In order to fix the issue, just set the buffers to NULL after releasing in
order to avoid the double free.

Comment 1 Avinash Hanwate 2024-12-28 14:37:16 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024122723-CVE-2024-53191-df03@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.