CVE-2024-38633

In the Linux kernel, the following vulnerability has been resolved: serial: max3100: Update uart_driver_registered on driver removal The removal of the last MAX3100 device triggers the removal of the driver. However, code doesn't update the respective global variable and after insmod — rmmod — insmod cycle the kernel oopses: max3100 spi-PRP0001:01: max3100_probe: adding port 0 BUG: kernel NULL pointer dereference, address: 0000000000000408 ... RIP: 0010:serial_core_register_port+0xa0/0x840 ... max3100_probe+0x1b6/0x280 [max3100] spi_probe+0x8d/0xb0 Update the actual state so next time UART driver will be registered again. Hugo also noticed, that the error path in the probe also affected by having the variable set, and not cleared. Instead of clearing it move the assignment after the successfull uart_register_driver() call.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

09 Sep 2024, 13:53

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/21a61a7fbcfdd3493cede43ebc7c4dfae2147a8b - () https://git.kernel.org/stable/c/21a61a7fbcfdd3493cede43ebc7c4dfae2147a8b - Patch
References () https://git.kernel.org/stable/c/361a92c9038e8c8c3996f8eeaa14522a8ad90752 - () https://git.kernel.org/stable/c/361a92c9038e8c8c3996f8eeaa14522a8ad90752 - Patch
References () https://git.kernel.org/stable/c/712a1fcb38dc7cac6da63ee79a88708fbf9c45ec - () https://git.kernel.org/stable/c/712a1fcb38dc7cac6da63ee79a88708fbf9c45ec - Patch
References () https://git.kernel.org/stable/c/9db4222ed8cd3e50b81c8b910ae74c26427a4003 - () https://git.kernel.org/stable/c/9db4222ed8cd3e50b81c8b910ae74c26427a4003 - Patch
References () https://git.kernel.org/stable/c/b6eb7aff23e05f362e8c9b560f6ac5e727b70e00 - () https://git.kernel.org/stable/c/b6eb7aff23e05f362e8c9b560f6ac5e727b70e00 - Patch
References () https://git.kernel.org/stable/c/e8a10089eddba40d4b2080c9d3fc2d2b2488f762 - () https://git.kernel.org/stable/c/e8a10089eddba40d4b2080c9d3fc2d2b2488f762 - Patch
References () https://git.kernel.org/stable/c/e8e2a4339decad7e59425b594a98613402652d72 - () https://git.kernel.org/stable/c/e8e2a4339decad7e59425b594a98613402652d72 - Patch
References () https://git.kernel.org/stable/c/fa84ca78b048dfb00df0ef446f5c35e0a98ca6a0 - () https://git.kernel.org/stable/c/fa84ca78b048dfb00df0ef446f5c35e0a98ca6a0 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

15 Jul 2024, 07:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: max3100: actualización uart_driver_registered al eliminar el controlador La eliminación del último dispositivo MAX3100 desencadena la eliminación del controlador. Sin embargo, el código no actualiza la variable global respectiva y después del ciclo insmod — rmmod — insmod, el kernel falla: max3100 spi-PRP0001:01: max3100_probe: agregando el puerto 0 ERROR: desreferencia del puntero NULL del kernel, dirección: 0000000000000408... RIP: 0010:serial_core_register_port+0xa0/0x840 ... max3100_probe+0x1b6/0x280 [max3100] spi_probe+0x8d/0xb0 Actualice el estado actual para que la próxima vez el controlador UART se registre nuevamente. Hugo también notó que la ruta de error en la sonda también se veía afectada por tener la variable configurada y no borrada. En lugar de borrarlo, mueva la asignación después de la llamada exitosa a uart_register_driver().
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

21 Jun 2024, 11:22

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-21 11:15

Updated : 2024-09-09 13:53


NVD link : CVE-2024-38633

Mitre link : CVE-2024-38633

CVE.ORG link : CVE-2024-38633


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference