In the Linux kernel, the following vulnerability has been resolved:
usb: cdns3: fix memory double free when handle zero packet
829 if (request->complete) {
830 spin_unlock(&priv_dev->lock);
831 usb_gadget_giveback_request(&priv_ep->endpoint,
832 request);
833 spin_lock(&priv_dev->lock);
834 }
835
836 if (request->buf == priv_dev->zlp_buf)
837 cdns3_gadget_ep_free_request(&priv_ep->endpoint, request);
Driver append an additional zero packet request when queue a packet, which
length mod max packet size is 0. When transfer complete, run to line 831,
usb_gadget_giveback_request() will free this requestion. 836 condition is
true, so cdns3_gadget_ep_free_request() free this request again.
Log:
[ 1920.140696][ T150] BUG: KFENCE: use-after-free read in cdns3_gadget_giveback+0x134/0x2c0 [cdns3]
[ 1920.140696][ T150]
[ 1920.151837][ T150] Use-after-free read at 0x000000003d1cd10b (in kfence-#36):
[ 1920.159082][ T150] cdns3_gadget_giveback+0x134/0x2c0 [cdns3]
[ 1920.164988][ T150] cdns3_transfer_completed+0x438/0x5f8 [cdns3]
Add check at line 829, skip call usb_gadget_giveback_request() if it is
additional zero length packet request. Needn't call
usb_gadget_giveback_request() because it is allocated in this driver.
References
Configurations
Configuration 1 (hide)
|
History
14 Jan 2025, 17:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/1e204a8e9eb514e22a6567fb340ebb47df3f3a48 - Patch | |
References | () https://git.kernel.org/stable/c/3a2a909942b5335b7ea66366d84261b3ed5f89c8 - Patch | |
References | () https://git.kernel.org/stable/c/5fd9e45f1ebcd57181358af28506e8a661a260b3 - Patch | |
References | () https://git.kernel.org/stable/c/70e8038813f9d3e72df966748ebbc40efe466019 - Patch | |
References | () https://git.kernel.org/stable/c/92d20406a3d4ff3e8be667c79209dc9ed31df5b3 - Patch | |
References | () https://git.kernel.org/stable/c/9a52b694b066f299d8b9800854a8503457a8b64c - Patch | |
References | () https://git.kernel.org/stable/c/aad6132ae6e4809e375431f8defd1521985e44e7 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
CWE | CWE-415 |
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/1e204a8e9eb514e22a6567fb340ebb47df3f3a48 - | |
References | () https://git.kernel.org/stable/c/3a2a909942b5335b7ea66366d84261b3ed5f89c8 - | |
References | () https://git.kernel.org/stable/c/5fd9e45f1ebcd57181358af28506e8a661a260b3 - | |
References | () https://git.kernel.org/stable/c/70e8038813f9d3e72df966748ebbc40efe466019 - | |
References | () https://git.kernel.org/stable/c/92d20406a3d4ff3e8be667c79209dc9ed31df5b3 - | |
References | () https://git.kernel.org/stable/c/9a52b694b066f299d8b9800854a8503457a8b64c - | |
References | () https://git.kernel.org/stable/c/aad6132ae6e4809e375431f8defd1521985e44e7 - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
03 Apr 2024, 17:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-03 17:15
Updated : 2025-01-14 17:27
NVD link : CVE-2024-26748
Mitre link : CVE-2024-26748
CVE.ORG link : CVE-2024-26748
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free