CVE-2024-36899

In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Fix use after free in lineinfo_changed_notify The use-after-free issue occurs as follows: when the GPIO chip device file is being closed by invoking gpio_chrdev_release(), watched_lines is freed by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier chain failed due to waiting write rwsem. Additionally, one of the GPIO chip's lines is also in the release process and holds the notifier chain's read rwsem. Consequently, a race condition leads to the use-after-free of watched_lines. Here is the typical stack when issue happened: [free] gpio_chrdev_release() --> bitmap_free(cdev->watched_lines) <-- freed --> blocking_notifier_chain_unregister() --> down_write(&nh->rwsem) <-- waiting rwsem --> __down_write_common() --> rwsem_down_write_slowpath() --> schedule_preempt_disabled() --> schedule() [use] st54spi_gpio_dev_release() --> gpio_free() --> gpiod_free() --> gpiod_free_commit() --> gpiod_line_state_notify() --> blocking_notifier_call_chain() --> down_read(&nh->rwsem); <-- held rwsem --> notifier_call_chain() --> lineinfo_changed_notify() --> test_bit(xxxx, cdev->watched_lines) <-- use after free The side effect of the use-after-free issue is that a GPIO line event is being generated for userspace where it shouldn't. However, since the chrdev is being closed, userspace won't have the chance to read that event anyway. To fix the issue, call the bitmap_free() function after the unregistration of lineinfo_changed_nb notifier chain.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*

History

02 Feb 2025, 11:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/2dfbb920a89bdc58087672ad5325dc6c588b6860 -

23 Jan 2025, 17:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/2d008d4961b039d2edce8976289773961b7e5fb5 -
  • () https://git.kernel.org/stable/c/d38c49f7bdf14381270736299e2ff68ec248a017 -

14 Jan 2025, 17:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da - () https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da - Patch
References () https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a - () https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a - Patch
References () https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239 - () https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239 - Patch
CWE CWE-416
CWE-362
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*

21 Nov 2024, 09:22

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da - () https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da -
References () https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a - () https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a -
References () https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239 - () https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpiolib: cdev: corrige el use after free en lineinfo_changed_notify El problema de use after free ocurre de la siguiente manera: cuando el archivo del dispositivo del chip GPIO se cierra al invocar gpio_chrdev_release(), las líneas vigiladas son liberado por bitmap_free(), pero la cancelación del registro de la cadena de notificador lineinfo_changed_nb falló debido a la espera de escritura de rwsem. Además, una de las líneas del chip GPIO también está en proceso de lanzamiento y contiene el rwsem de lectura de la cadena notificadora. En consecuencia, una condición de ejecución conduce al use after free de watched_lines. Aquí está la pila típica cuando ocurrió el problema: [free] gpio_chrdev_release() --&gt; bitmap_free(cdev-&gt;watched_lines) &lt;-- freed --&gt; blocking_notifier_chain_unregister() --&gt; down_write(&amp;nh-&gt;rwsem) &lt;-- waiting rwsem --&gt; __down_write_common() --&gt; rwsem_down_write_slowpath() --&gt; schedule_preempt_disabled() --&gt; schedule() [use] st54spi_gpio_dev_release() --&gt; gpio_free() --&gt; gpiod_free() --&gt; gpiod_free_commit() --&gt; gpiod_line_state_notify() --&gt; blocking_notifier_call_chain() --&gt; down_read(&amp;nh-&gt;rwsem); &lt;-- held rwsem --&gt; notifier_call_chain() --&gt; lineinfo_changed_notify() --&gt; test_bit(xxxx, cdev-&gt;watched_lines) &lt;-- use after free El efecto secundario del problema de use after free es que un GPIO El evento de línea se está generando para el espacio de usuario donde no debería. Sin embargo, dado que chrdev se cerrará, el espacio de usuario no tendrá la oportunidad de leer ese evento de todos modos. Para solucionar el problema, llame a la función bitmap_free() después de cancelar el registro de la cadena de notificadores lineinfo_changed_nb.

30 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-30 16:15

Updated : 2025-02-02 11:15


NVD link : CVE-2024-36899

Mitre link : CVE-2024-36899

CVE.ORG link : CVE-2024-36899


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-416

Use After Free