### [CVE-2024-39282](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39282) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=13e920d93e37fcaef4a9309515798a3cae9dcf19%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.19%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:net: wwan: t7xx: Fix FSM command timeout issueWhen driver processes the internal state change command, it use anasynchronous thread to process the command operation. If the mainthread detects that the task has timed out, the asynchronous threadwill panic when executing the completion notification because themain thread completion object has been released.BUG: unable to handle page fault for address: fffffffffffffff8PGD 1f283a067 P4D 1f283a067 PUD 1f283c067 PMD 0Oops: 0000 [#1] PREEMPT SMP NOPTIRIP: 0010:complete_all+0x3e/0xa0[...]Call Trace: ? __die_body+0x68/0xb0 ? page_fault_oops+0x379/0x3e0 ? exc_page_fault+0x69/0xa0 ? asm_exc_page_fault+0x22/0x30 ? complete_all+0x3e/0xa0 fsm_main_thread+0xa3/0x9c0 [mtk_t7xx (HASH:1400 5)] ? __pfx_autoremove_wake_function+0x10/0x10 kthread+0xd8/0x110 ? __pfx_fsm_main_thread+0x10/0x10 [mtk_t7xx (HASH:1400 5)] ? __pfx_kthread+0x10/0x10 ret_from_fork+0x38/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 [...]CR2: fffffffffffffff8---[ end trace 0000000000000000 ]---Use the reference counter to ensure safe release as Sergey suggests:https://lore.kernel.org/all/da90f64c-260a-4329-87bf-1f9ff20a5951@gmail.com/ ### POC #### Reference No PoCs from references. #### Github - https://github.com/oogasawa/Utility-security - https://github.com/w4zu/Debian_security