CVE-2024-26749
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
03/04/2024
Last modified:
14/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()<br />
<br />
...<br />
cdns3_gadget_ep_free_request(&priv_ep->endpoint, &priv_req->request);<br />
list_del_init(&priv_req->list);<br />
...<br />
<br />
&#39;priv_req&#39; actually free at cdns3_gadget_ep_free_request(). But<br />
list_del_init() use priv_req->list after it.<br />
<br />
[ 1542.642868][ T534] BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xd4<br />
[ 1542.642868][ T534]<br />
[ 1542.653162][ T534] Use-after-free read at 0x000000009ed0ba99 (in kfence-#3):<br />
[ 1542.660311][ T534] __list_del_entry_valid+0x10/0xd4<br />
[ 1542.665375][ T534] cdns3_gadget_ep_disable+0x1f8/0x388 [cdns3]<br />
[ 1542.671571][ T534] usb_ep_disable+0x44/0xe4<br />
[ 1542.675948][ T534] ffs_func_eps_disable+0x64/0xc8<br />
[ 1542.680839][ T534] ffs_func_set_alt+0x74/0x368<br />
[ 1542.685478][ T534] ffs_func_disable+0x18/0x28<br />
<br />
Move list_del_init() before cdns3_gadget_ep_free_request() to resolve this<br />
problem.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4 (including) | 5.4.270 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.211 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.150 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.80 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.19 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.7 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2134e9906e17b1e5284300fab547869ebacfd7d9
- https://git.kernel.org/stable/c/29e42e1578a10c611b3f1a38f3229b2d664b5d16
- https://git.kernel.org/stable/c/4e5c73b15d95452c1ba9c771dd013a3fbe052ff3
- https://git.kernel.org/stable/c/9a07244f614bc417de527b799da779dcae780b5d
- https://git.kernel.org/stable/c/b40328eea93c75a5645891408010141a0159f643
- https://git.kernel.org/stable/c/cd45f99034b0c8c9cb346dd0d6407a95ca3d36f6
- https://git.kernel.org/stable/c/cfa9abb5570c489dabf6f7fb3a066cc576fc8824
- https://git.kernel.org/stable/c/2134e9906e17b1e5284300fab547869ebacfd7d9
- https://git.kernel.org/stable/c/29e42e1578a10c611b3f1a38f3229b2d664b5d16
- https://git.kernel.org/stable/c/4e5c73b15d95452c1ba9c771dd013a3fbe052ff3
- https://git.kernel.org/stable/c/9a07244f614bc417de527b799da779dcae780b5d
- https://git.kernel.org/stable/c/b40328eea93c75a5645891408010141a0159f643
- https://git.kernel.org/stable/c/cd45f99034b0c8c9cb346dd0d6407a95ca3d36f6
- https://git.kernel.org/stable/c/cfa9abb5570c489dabf6f7fb3a066cc576fc8824
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html