First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925e: fix use-after-free in free_irq() From commit a304e1b82808 ("[PATCH] Debug shared irqs"), there is a test to make sure the shared irq handler should be able to handle the unexpected event after deregistration. For this case, let's apply MT76_REMOVED flag to indicate the device was removed and do not run into the resource access anymore.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.7.11 | 6.7.11 |
redhat/kernel | <6.8.2 | 6.8.2 |
redhat/kernel | <6.9 | 6.9 |
Linux Kernel | >=6.7<6.7.11 | |
Linux Kernel | >=6.8<6.8.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27049 has a high severity rating due to the potential for a use-after-free condition in the Linux kernel.
To fix CVE-2024-27049, upgrade the Linux kernel to version 6.7.11, 6.8.2, 6.9, or the specified patched versions provided by your distribution.
CVE-2024-27049 is caused by a use-after-free vulnerability related to the consistent handling of shared IRQs in the mt76 driver for Linux.
CVE-2024-27049 affects various versions of the Linux kernel, including those not upgraded to the patched versions mentioned in the advisory.
As of now, there is no public information available indicating that CVE-2024-27049 is actively being exploited in the wild.