CVE-2024-26748
Severity CVSS v4.0:
Pending analysis
Type:
CWE-415
Double Free
Publication date:
03/04/2024
Last modified:
14/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: cdns3: fix memory double free when handle zero packet<br />
<br />
829 if (request->complete) {<br />
830 spin_unlock(&priv_dev->lock);<br />
831 usb_gadget_giveback_request(&priv_ep->endpoint,<br />
832 request);<br />
833 spin_lock(&priv_dev->lock);<br />
834 }<br />
835<br />
836 if (request->buf == priv_dev->zlp_buf)<br />
837 cdns3_gadget_ep_free_request(&priv_ep->endpoint, request);<br />
<br />
Driver append an additional zero packet request when queue a packet, which<br />
length mod max packet size is 0. When transfer complete, run to line 831,<br />
usb_gadget_giveback_request() will free this requestion. 836 condition is<br />
true, so cdns3_gadget_ep_free_request() free this request again.<br />
<br />
Log:<br />
<br />
[ 1920.140696][ T150] BUG: KFENCE: use-after-free read in cdns3_gadget_giveback+0x134/0x2c0 [cdns3]<br />
[ 1920.140696][ T150]<br />
[ 1920.151837][ T150] Use-after-free read at 0x000000003d1cd10b (in kfence-#36):<br />
[ 1920.159082][ T150] cdns3_gadget_giveback+0x134/0x2c0 [cdns3]<br />
[ 1920.164988][ T150] cdns3_transfer_completed+0x438/0x5f8 [cdns3]<br />
<br />
Add check at line 829, skip call usb_gadget_giveback_request() if it is<br />
additional zero length packet request. Needn&#39;t call<br />
usb_gadget_giveback_request() because it is allocated in this driver.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4 (including) | 5.4.270 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.211 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.150 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.80 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.19 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.7 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1e204a8e9eb514e22a6567fb340ebb47df3f3a48
- https://git.kernel.org/stable/c/3a2a909942b5335b7ea66366d84261b3ed5f89c8
- https://git.kernel.org/stable/c/5fd9e45f1ebcd57181358af28506e8a661a260b3
- https://git.kernel.org/stable/c/70e8038813f9d3e72df966748ebbc40efe466019
- https://git.kernel.org/stable/c/92d20406a3d4ff3e8be667c79209dc9ed31df5b3
- https://git.kernel.org/stable/c/9a52b694b066f299d8b9800854a8503457a8b64c
- https://git.kernel.org/stable/c/aad6132ae6e4809e375431f8defd1521985e44e7
- https://git.kernel.org/stable/c/1e204a8e9eb514e22a6567fb340ebb47df3f3a48
- https://git.kernel.org/stable/c/3a2a909942b5335b7ea66366d84261b3ed5f89c8
- https://git.kernel.org/stable/c/5fd9e45f1ebcd57181358af28506e8a661a260b3
- https://git.kernel.org/stable/c/70e8038813f9d3e72df966748ebbc40efe466019
- https://git.kernel.org/stable/c/92d20406a3d4ff3e8be667c79209dc9ed31df5b3
- https://git.kernel.org/stable/c/9a52b694b066f299d8b9800854a8503457a8b64c
- https://git.kernel.org/stable/c/aad6132ae6e4809e375431f8defd1521985e44e7
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html