Executive Summary

Informations
Name CVE-2024-39479 First vendor Publication 2024-07-05
Vendor Cve Last vendor Modification 2025-05-30

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/hwmon: Get rid of devm

When both hwmon and hwmon drvdata (on which hwmon depends) are device managed resources, the expectation, on device unbind, is that hwmon will be released before drvdata. However, in i915 there are two separate code paths, which both release either drvdata or hwmon and either can be released before the other. These code paths (for device unbind) are as follows (see also the bug referenced below):

Call Trace: release_nodes+0x11/0x70 devres_release_group+0xb2/0x110 component_unbind_all+0x8d/0xa0 component_del+0xa5/0x140 intel_pxp_tee_component_fini+0x29/0x40 [i915] intel_pxp_fini+0x33/0x80 [i915] i915_driver_remove+0x4c/0x120 [i915] i915_pci_remove+0x19/0x30 [i915] pci_device_remove+0x32/0xa0 device_release_driver_internal+0x19c/0x200 unbind_store+0x9c/0xb0

and

Call Trace: release_nodes+0x11/0x70 devres_release_all+0x8a/0xc0 device_unbind_cleanup+0x9/0x70 device_release_driver_internal+0x1c1/0x200 unbind_store+0x9c/0xb0

This means that in i915, if use devm, we cannot gurantee that hwmon will always be released before drvdata. Which means that we have a uaf if hwmon sysfs is accessed when drvdata has been released but hwmon hasn't.

The only way out of this seems to be do get rid of devm_ and release/free everything explicitly during device unbind.

v2: Change commit message and other minor code changes v3: Cleanup from i915_hwmon_register on error (Armin Wolf) v4: Eliminate potential static analyzer warning (Rodrigo)
Eliminate fetch_and_zero (Jani) v5: Restore previous logic for ddat_gt->hwmon_dev error return (Andi)

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39479

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3668

Sources (Detail)

https://git.kernel.org/stable/c/5bc9de065b8bb9b8dd8799ecb4592d0403b54281
https://git.kernel.org/stable/c/ce5a22d22db691d14516c3b8fdbf69139eb2ea8f
https://git.kernel.org/stable/c/cfa73607eb21a4ce1d6294a2c5733628897b48a2
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Date Informations
2025-07-15 02:35:06
  • Multiple Updates
2025-07-14 12:33:34
  • Multiple Updates
2025-06-26 02:32:31
  • Multiple Updates
2025-06-25 12:31:50
  • Multiple Updates
2025-06-24 02:37:10
  • Multiple Updates
2025-05-31 00:20:47
  • Multiple Updates
2025-05-27 02:41:37
  • Multiple Updates
2025-03-29 03:37:54
  • Multiple Updates
2025-03-28 13:43:14
  • Multiple Updates
2025-03-28 03:16:31
  • Multiple Updates
2025-03-19 03:11:56
  • Multiple Updates
2025-03-18 03:24:48
  • Multiple Updates
2025-03-14 03:12:10
  • Multiple Updates
2025-03-06 14:08:34
  • Multiple Updates
2025-02-22 03:22:04
  • Multiple Updates
2025-01-08 03:03:25
  • Multiple Updates
2025-01-07 03:02:58
  • Multiple Updates
2024-12-25 03:01:36
  • Multiple Updates
2024-12-12 03:04:34
  • Multiple Updates
2024-11-25 09:24:16
  • Multiple Updates
2024-11-22 21:23:19
  • Multiple Updates
2024-11-21 21:22:55
  • Multiple Updates
2024-11-20 02:58:13
  • Multiple Updates
2024-11-14 02:58:31
  • Multiple Updates
2024-11-09 02:58:32
  • Multiple Updates
2024-10-26 02:55:56
  • Multiple Updates
2024-10-25 02:57:51
  • Multiple Updates
2024-10-23 02:57:03
  • Multiple Updates
2024-10-03 02:52:24
  • Multiple Updates
2024-10-02 02:50:48
  • Multiple Updates
2024-09-15 02:48:37
  • Multiple Updates
2024-09-12 02:48:10
  • Multiple Updates
2024-09-07 02:47:11
  • Multiple Updates
2024-09-06 02:46:22
  • Multiple Updates
2024-09-04 02:49:36
  • Multiple Updates
2024-08-22 02:47:36
  • Multiple Updates
2024-08-02 13:56:35
  • Multiple Updates
2024-08-02 01:35:48
  • Multiple Updates
2024-07-09 00:27:32
  • Multiple Updates
2024-07-08 21:27:29
  • Multiple Updates
2024-07-05 17:27:24
  • Multiple Updates
2024-07-05 13:27:27
  • First insertion