Описание
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null
Considering that in some extreme cases, when performing the unbinding operation, gserial_disconnect has cleared gser->ioport, which triggers gadget reconfiguration, and then calls gs_read_complete, resulting in access to a null pointer. Therefore, ep is disabled before gserial_disconnect sets port to null to prevent this from happening.
Call trace: gs_read_complete+0x58/0x240 usb_gadget_giveback_request+0x40/0x160 dwc3_remove_requests+0x170/0x484 dwc3_ep0_out_start+0xb0/0x1d4 __dwc3_gadget_start+0x25c/0x720 kretprobe_trampoline.cfi_jt+0x0/0x8 kretprobe_trampoline.cfi_jt+0x0/0x8 udc_bind_to_driver+0x1d8/0x300 usb_gadget_probe_driver+0xa8/0x1dc gadget_dev_desc_UDC_store+0x13c/0x188 configfs_write_iter+0x160/0x1f4 vfs_write+0x2d0/0x40c ksys_write+0x7c/0xf0 __arm64_sys_write+0x20/0x30 invoke_syscall...
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null
Considering that in some extreme cases, when performing the unbinding operation, gserial_disconnect has cleared gser->ioport, which triggers gadget reconfiguration, and then calls gs_read_complete, resulting in access to a null pointer. Therefore, ep is disabled before gserial_disconnect sets port to null to prevent this from happening.
Call trace: gs_read_complete+0x58/0x240 usb_gadget_giveback_request+0x40/0x160 dwc3_remove_requests+0x170/0x484 dwc3_ep0_out_start+0xb0/0x1d4 __dwc3_gadget_start+0x25c/0x720 kretprobe_trampoline.cfi_jt+0x0/0x8 kretprobe_trampoline.cfi_jt+0x0/0x8 udc_bind_to_driver+0x1d8/0x300 usb_gadget_probe_driver+0xa8/0x1dc gadget_dev_desc_UDC_store+0x13c/0x188 configfs_write_iter+0x160/0x1f4 vfs_write+0x2d0/0x40c ksys_write+0x7c/0xf0 __arm64_sys_write+0x20/0x30 invoke_syscall+0x60/0x150 el0_svc_common+0x8c/0xf8 do_el0_svc+0x28/0xa0 el0_svc+0x24/0x84
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-57915
- https://git.kernel.org/stable/c/0c50f00cc29948184af05bda31392fff5821f4f3
- https://git.kernel.org/stable/c/1062b648bff63ed62b2d47a045e08ea9741d98ea
- https://git.kernel.org/stable/c/13014969cbf07f18d62ceea40bd8ca8ec9d36cec
- https://git.kernel.org/stable/c/3d730e8758c75b68a0152ee1ac48a270ea6725b4
- https://git.kernel.org/stable/c/8e122d780a0f19aefd700dbd0b0e3ed3af0ae97f
- https://git.kernel.org/stable/c/d2de56cc45ee447f005d63217e84988b4f02faa9
- https://git.kernel.org/stable/c/f5f33fb57aae12e4b0add79e0242f458ea0bc510
Связанные уязвимости
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[REJECTED CVE] A vulnerability in the Linux kernel's USB gadget subsystem allowed a race condition where gserial_disconnect could clear gser->ioport during unbinding, leading to a null pointer dereference in gs_read_complete, potentially causing a kernel crash. An attacker could exploit this by repeatedly triggering gadget reconfiguration, leading to denial of service. This issue has been resolved by disabling the endpoint before setting the port to null, preventing access to freed resources.
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.