CVE-2023-52528
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/03/2024
Last modified:
11/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg<br />
<br />
syzbot reported the following uninit-value access issue:<br />
<br />
=====================================================<br />
BUG: KMSAN: uninit-value in smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]<br />
BUG: KMSAN: uninit-value in smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482<br />
CPU: 0 PID: 8696 Comm: kworker/0:3 Not tainted 5.8.0-rc5-syzkaller #0<br />
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011<br />
Workqueue: usb_hub_wq hub_event<br />
Call Trace:<br />
__dump_stack lib/dump_stack.c:77 [inline]<br />
dump_stack+0x21c/0x280 lib/dump_stack.c:118<br />
kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:121<br />
__msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215<br />
smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]<br />
smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482<br />
usbnet_probe+0x1152/0x3f90 drivers/net/usb/usbnet.c:1737<br />
usb_probe_interface+0xece/0x1550 drivers/usb/core/driver.c:374<br />
really_probe+0xf20/0x20b0 drivers/base/dd.c:529<br />
driver_probe_device+0x293/0x390 drivers/base/dd.c:701<br />
__device_attach_driver+0x63f/0x830 drivers/base/dd.c:807<br />
bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431<br />
__device_attach+0x4e2/0x7f0 drivers/base/dd.c:873<br />
device_initial_probe+0x4a/0x60 drivers/base/dd.c:920<br />
bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491<br />
device_add+0x3b0e/0x40d0 drivers/base/core.c:2680<br />
usb_set_configuration+0x380f/0x3f10 drivers/usb/core/message.c:2032<br />
usb_generic_driver_probe+0x138/0x300 drivers/usb/core/generic.c:241<br />
usb_probe_device+0x311/0x490 drivers/usb/core/driver.c:272<br />
really_probe+0xf20/0x20b0 drivers/base/dd.c:529<br />
driver_probe_device+0x293/0x390 drivers/base/dd.c:701<br />
__device_attach_driver+0x63f/0x830 drivers/base/dd.c:807<br />
bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431<br />
__device_attach+0x4e2/0x7f0 drivers/base/dd.c:873<br />
device_initial_probe+0x4a/0x60 drivers/base/dd.c:920<br />
bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491<br />
device_add+0x3b0e/0x40d0 drivers/base/core.c:2680<br />
usb_new_device+0x1bd4/0x2a30 drivers/usb/core/hub.c:2554<br />
hub_port_connect drivers/usb/core/hub.c:5208 [inline]<br />
hub_port_connect_change drivers/usb/core/hub.c:5348 [inline]<br />
port_event drivers/usb/core/hub.c:5494 [inline]<br />
hub_event+0x5e7b/0x8a70 drivers/usb/core/hub.c:5576<br />
process_one_work+0x1688/0x2140 kernel/workqueue.c:2269<br />
worker_thread+0x10bc/0x2730 kernel/workqueue.c:2415<br />
kthread+0x551/0x590 kernel/kthread.c:292<br />
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:293<br />
<br />
Local variable ----buf.i87@smsc75xx_bind created at:<br />
__smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]<br />
smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]<br />
smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482<br />
__smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]<br />
smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]<br />
smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482<br />
<br />
This issue is caused because usbnet_read_cmd() reads less bytes than requested<br />
(zero byte in the reproducer). In this case, &#39;buf&#39; is not properly filled.<br />
<br />
This patch fixes the issue by returning -ENODATA if usbnet_read_cmd() reads<br />
less bytes than requested.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.34 (including) | 4.14.327 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.296 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.258 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.198 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.135 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.57 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.5.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2a36d9e2995c8c3c3f179aab1215a69cff06cbed
- https://git.kernel.org/stable/c/30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5
- https://git.kernel.org/stable/c/310f1c92f65ad905b7e81fe14de82d979ebbd825
- https://git.kernel.org/stable/c/3e0af6eec1789fd11934164a7f4dbcad979855a4
- https://git.kernel.org/stable/c/4931e80da9463b03bfe42be54a9a19f213b0f76d
- https://git.kernel.org/stable/c/9ffc5018020fe646795a8dc1203224b8f776dc09
- https://git.kernel.org/stable/c/cda10784a176d7192f08ecb518f777a4e9575812
- https://git.kernel.org/stable/c/e9c65989920f7c28775ec4e0c11b483910fb67b8
- https://git.kernel.org/stable/c/2a36d9e2995c8c3c3f179aab1215a69cff06cbed
- https://git.kernel.org/stable/c/30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5
- https://git.kernel.org/stable/c/310f1c92f65ad905b7e81fe14de82d979ebbd825
- https://git.kernel.org/stable/c/3e0af6eec1789fd11934164a7f4dbcad979855a4
- https://git.kernel.org/stable/c/4931e80da9463b03bfe42be54a9a19f213b0f76d
- https://git.kernel.org/stable/c/9ffc5018020fe646795a8dc1203224b8f776dc09
- https://git.kernel.org/stable/c/cda10784a176d7192f08ecb518f777a4e9575812
- https://git.kernel.org/stable/c/e9c65989920f7c28775ec4e0c11b483910fb67b8



