CVE-2024-49874

In the Linux kernel, the following vulnerability has been resolved: i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition In the svc_i3c_master_probe function, &master->hj_work is bound with svc_i3c_master_hj_work, &master->ibi_work is bound with svc_i3c_master_ibi_work. And svc_i3c_master_ibi_work can start the hj_work, svc_i3c_master_irq_handler can start the ibi_work. If we remove the module which will call svc_i3c_master_remove to make cleanup, it will free master->base through i3c_master_unregister while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows: CPU0 CPU1 | svc_i3c_master_hj_work svc_i3c_master_remove | i3c_master_unregister(&master->base)| device_unregister(&master->dev) | device_release | //free master->base | | i3c_master_do_daa(&master->base) | //use master->base Fix it by ensuring that the work is canceled before proceeding with the cleanup in svc_i3c_master_remove.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Oct 2024, 20:27

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/27b55724d3f781dd6e635e89dc6e2fd78fa81a00 - () https://git.kernel.org/stable/c/27b55724d3f781dd6e635e89dc6e2fd78fa81a00 - Patch
References () https://git.kernel.org/stable/c/4318998892bf8fe99f97bea18c37ae7b685af75a - () https://git.kernel.org/stable/c/4318998892bf8fe99f97bea18c37ae7b685af75a - Patch
References () https://git.kernel.org/stable/c/4ac637122930cc4ab7e2c22e364cf3aaf96b05b1 - () https://git.kernel.org/stable/c/4ac637122930cc4ab7e2c22e364cf3aaf96b05b1 - Patch
References () https://git.kernel.org/stable/c/61850725779709369c7e907ae8c7c75dc7cec4f3 - () https://git.kernel.org/stable/c/61850725779709369c7e907ae8c7c75dc7cec4f3 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
CWE CWE-416

23 Oct 2024, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i3c: master: svc: Se corrige la vulnerabilidad de use after free en el controlador svc_i3c_master debido a la condición de ejecución En la función svc_i3c_master_probe, &master->hj_work está vinculado con svc_i3c_master_hj_work, &master->ibi_work está vinculado con svc_i3c_master_ibi_work. Y svc_i3c_master_ibi_work puede iniciar hj_work, svc_i3c_master_irq_handler puede iniciar ibi_work. Si eliminamos el módulo que llamará a svc_i3c_master_remove para realizar la limpieza, liberará master->base a través de i3c_master_unregister mientras que el trabajo mencionado anteriormente se utilizará. La secuencia de operaciones que pueden provocar un error de UAF es la siguiente: CPU0 CPU1 | Solucione el problema asegurándose de que el trabajo se cancele antes de continuar con la limpieza en svc_i3c_master_remove.

21 Oct 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 18:15

Updated : 2024-10-24 20:27


NVD link : CVE-2024-49874

Mitre link : CVE-2024-49874

CVE.ORG link : CVE-2024-49874


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free