Rapid7 Vulnerability & Exploit Database

Oracle Linux: (CVE-2024-26892) ELSA-2024-3618: kernel update

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: (CVE-2024-26892) ELSA-2024-3618: kernel update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/17/2024
Created
06/07/2024
Added
06/06/2024
Modified
06/06/2024

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921e: fix use-after-free in free_irq()

From commit a304e1b82808 ("[PATCH] Debug shared irqs"), there is a test

to make sure the shared irq handler should be able to handle the unexpected

event after deregistration. For this case, let's apply MT76_REMOVED flag to

indicate the device was removed and do not run into the resource access

anymore.

BUG: KASAN: use-after-free in mt7921_irq_handler+0xd8/0x100 [mt7921e]

Read of size 8 at addr ffff88824a7d3b78 by task rmmod/11115

CPU: 28 PID: 11115 Comm: rmmod Tainted: G W L 5.17.0 #10

Hardware name: Micro-Star International Co., Ltd. MS-7D73/MPG B650I

EDGE WIFI (MS-7D73), BIOS 1.81 01/05/2024

Call Trace:

<TASK>

dump_stack_lvl+0x6f/0xa0

print_address_description.constprop.0+0x1f/0x190

? mt7921_irq_handler+0xd8/0x100 [mt7921e]

? mt7921_irq_handler+0xd8/0x100 [mt7921e]

kasan_report.cold+0x7f/0x11b

? mt7921_irq_handler+0xd8/0x100 [mt7921e]

mt7921_irq_handler+0xd8/0x100 [mt7921e]

free_irq+0x627/0xaa0

devm_free_irq+0x94/0xd0

? devm_request_any_context_irq+0x160/0x160

? kobject_put+0x18d/0x4a0

mt7921_pci_remove+0x153/0x190 [mt7921e]

pci_device_remove+0xa2/0x1d0

__device_release_driver+0x346/0x6e0

driver_detach+0x1ef/0x2c0

bus_remove_driver+0xe7/0x2d0

? __check_object_size+0x57/0x310

pci_unregister_driver+0x26/0x250

__do_sys_delete_module+0x307/0x510

? free_module+0x6a0/0x6a0

? fpregs_assert_state_consistent+0x4b/0xb0

? rcu_read_lock_sched_held+0x10/0x70

? syscall_enter_from_user_mode+0x20/0x70

? trace_hardirqs_on+0x1c/0x130

do_syscall_64+0x5c/0x80

? trace_hardirqs_on_prepare+0x72/0x160

? do_syscall_64+0x68/0x80

? trace_hardirqs_on_prepare+0x72/0x160

entry_SYSCALL_64_after_hwframe+0x44/0xae

Solution(s)

  • oracle-linux-upgrade-kernel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;