We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-44997

net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb()



AssignerLinux
Reserved2024-08-21
Published2024-09-04
Updated2024-09-04

Description

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() When there are multiple ap interfaces on one band and with WED on, turning the interface down will cause a kernel panic on MT798X. Previously, cb_priv was freed in mtk_wed_setup_tc_block() without marking NULL,and mtk_wed_setup_tc_block_cb() didn't check the value, too. Assign NULL after free cb_priv in mtk_wed_setup_tc_block() and check NULL in mtk_wed_setup_tc_block_cb(). ---------- Unable to handle kernel paging request at virtual address 0072460bca32b4f5 Call trace: mtk_wed_setup_tc_block_cb+0x4/0x38 0xffffffc0794084bc tcf_block_playback_offloads+0x70/0x1e8 tcf_block_unbind+0x6c/0xc8 ... ---------

Product status

Default status
0x4002b66ed0

799684448e3e before 326a89321f9d
affected

799684448e3e before b453a4bbda03
affected

799684448e3e before db1b4bedb9b9
affected

Default status
0x4002b66f80

6.2
affected

Any version before 6.2
unaffected

6.6.48
unaffected

6.10.7
unaffected

6.11-rc4
unaffected

References

https://git.kernel.org/stable/c/326a89321f9d5fe399fe6f9ff7c0fc766582a6a0

https://git.kernel.org/stable/c/b453a4bbda03aa8741279c360ac82d1c3ac33548

https://git.kernel.org/stable/c/db1b4bedb9b97c6d34b03d03815147c04fffe8b4

cve.org CVE-2024-44997

nvd.nist.gov CVE-2024-44997

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-44997
Subscribe to our newsletter to learn more about our work.