๐Ÿ” CVE Alert

CVE-2024-53191

HIGH 7.8

wifi: ath12k: fix warning when unbinding

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix warning when unbinding If there is an error during some initialization related to firmware, the buffers dp->tx_ring[i].tx_status are released. However this is released again when the device is unbinded (ath12k_pci), and we get: WARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80 Call Trace: free_large_kmalloc ath12k_dp_free ath12k_core_deinit ath12k_pci_remove ... The issue is always reproducible from a VM because the MSI addressing initialization is failing. In order to fix the issue, just set the buffers to NULL after releasing in order to avoid the double free.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 27, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d889913205cf7ebda905b1e62c5867ed4e39f6c2 < 223b546c6222d42147eff034433002ca5e2e7e09 d889913205cf7ebda905b1e62c5867ed4e39f6c2 < 90556b96338aa6037cd26dac857327fda7c19732 d889913205cf7ebda905b1e62c5867ed4e39f6c2 < 94c9100b600f05a36b33f9ed76dbd6fb0eb25386 d889913205cf7ebda905b1e62c5867ed4e39f6c2 < ca68ce0d9f4bcd032fd1334441175ae399642a06
Linux / Linux
6.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/223b546c6222d42147eff034433002ca5e2e7e09 git.kernel.org: https://git.kernel.org/stable/c/90556b96338aa6037cd26dac857327fda7c19732 git.kernel.org: https://git.kernel.org/stable/c/94c9100b600f05a36b33f9ed76dbd6fb0eb25386 git.kernel.org: https://git.kernel.org/stable/c/ca68ce0d9f4bcd032fd1334441175ae399642a06