CVE-2024-44997 — Use After Free in Linux
Severity
7.8HIGHNVD
EPSS
0.0%
top 93.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 4
Latest updateSep 10
Description
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb()
When there are multiple ap interfaces on one band and with WED on,
turning the interface down will cause a kernel panic on MT798X.
Previously, cb_priv was freed in mtk_wed_setup_tc_block() without
marking NULL,and mtk_wed_setup_tc_block_cb() didn't check the value, too.
Assign NULL after free cb_priv in mtk_wed_setup_tc_block() and check NULL
in …
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages8 packages
▶CVEListV5linux/linux799684448e3e1f57257a6155541e53510488f67b — 326a89321f9d5fe399fe6f9ff7c0fc766582a6a0+3
Patches
🔴Vulnerability Details
2OSV▶
CVE-2024-44997: In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() Wh↗2024-09-04
GHSA▶
GHSA-2jrr-ff5x-5jqg: In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb()↗2024-09-04
📋Vendor Advisories
3Microsoft
▶
Red Hat
▶
Debian▶
CVE-2024-44997: linux - In the Linux kernel, the following vulnerability has been resolved: net: ethern...↗2024