CVE-2022-48838
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
16/07/2024
Last modified:
24/07/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: gadget: Fix use-after-free bug by not setting udc->dev.driver<br />
<br />
The syzbot fuzzer found a use-after-free bug:<br />
<br />
BUG: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320<br />
Read of size 8 at addr ffff88802b934098 by task udevd/3689<br />
<br />
CPU: 2 PID: 3689 Comm: udevd Not tainted 5.17.0-rc4-syzkaller-00229-g4f12b742eb2b #0<br />
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014<br />
Call Trace:<br />
<br />
__dump_stack lib/dump_stack.c:88 [inline]<br />
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106<br />
print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255<br />
__kasan_report mm/kasan/report.c:442 [inline]<br />
kasan_report.cold+0x83/0xdf mm/kasan/report.c:459<br />
dev_uevent+0x712/0x780 drivers/base/core.c:2320<br />
uevent_show+0x1b8/0x380 drivers/base/core.c:2391<br />
dev_attr_show+0x4b/0x90 drivers/base/core.c:2094<br />
<br />
Although the bug manifested in the driver core, the real cause was a<br />
race with the gadget core. dev_uevent() does:<br />
<br />
if (dev->driver)<br />
add_uevent_var(env, "DRIVER=%s", dev->driver->name);<br />
<br />
and between the test and the dereference of dev->driver, the gadget<br />
core sets dev->driver to NULL.<br />
<br />
The race wouldn&#39;t occur if the gadget core registered its devices on<br />
a real bus, using the standard synchronization techniques of the<br />
driver core. However, it&#39;s not necessary to make such a large change<br />
in order to fix this bug; all we need to do is make sure that<br />
udc->dev.driver is always NULL.<br />
<br />
In fact, there is no reason for udc->dev.driver ever to be set to<br />
anything, let alone to the value it currently gets: the address of the<br />
gadget&#39;s driver. After all, a gadget driver only knows how to manage<br />
a gadget, not how to manage a UDC.<br />
<br />
This patch simply removes the statements in the gadget core that touch<br />
udc->dev.driver.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.1 (including) | 4.9.308 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.273 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.236 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.187 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.108 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.31 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.17 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/00bdd9bf1ac6d401ad926d3d8df41b9f1399f646
- https://git.kernel.org/stable/c/16b1941eac2bd499f065a6739a40ce0011a3d740
- https://git.kernel.org/stable/c/2015c23610cd0efadaeca4d3a8d1dae9a45aa35a
- https://git.kernel.org/stable/c/2282a6eb6d4e118e294e43dcc421e0e0fe4040b5
- https://git.kernel.org/stable/c/27d64436984fb8835a8b7e95993193cc478b162e
- https://git.kernel.org/stable/c/4325124dde6726267813c736fee61226f1d38f0b
- https://git.kernel.org/stable/c/609a7119bffe3ddd7c93f2fa65be8917e02a0b7e
- https://git.kernel.org/stable/c/e2d3a7009e505e120805f449c832942660f3f7f3