๐Ÿ” CVE Alert

CVE-2024-44932

UNKNOWN 0.0

idpf: fix UAFs when destroying the queues

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: idpf: fix UAFs when destroying the queues The second tagged commit started sometimes (very rarely, but possible) throwing WARNs from net/core/page_pool.c:page_pool_disable_direct_recycling(). Turned out idpf frees interrupt vectors with embedded NAPIs *before* freeing the queues making page_pools' NAPI pointers lead to freed memory before these pools are destroyed by libeth. It's not clear whether there are other accesses to the freed vectors when destroying the queues, but anyway, we usually free queue/interrupt vectors only when the queues are destroyed and the NAPIs are guaranteed to not be referenced anywhere. Invert the allocation and freeing logic making queue/interrupt vectors be allocated first and freed last. Vectors don't require queues to be present, so this is safe. Additionally, this change allows to remove that useless queue->q_vector pointer cleanup, as vectors are still valid when freeing the queues (+ both are freed within one function, so it's not clear why nullify the pointers at all).

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 26, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1c325aac10a82f11410da8a2bf35e3e410a42751 < 3cde714b0e77206ed1b5cf31f28c18ba9ae946fd 1c325aac10a82f11410da8a2bf35e3e410a42751 < 290f1c033281c1a502a3cd1c53c3a549259c491f
Linux / Linux
6.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3cde714b0e77206ed1b5cf31f28c18ba9ae946fd git.kernel.org: https://git.kernel.org/stable/c/290f1c033281c1a502a3cd1c53c3a549259c491f