In the Linux kernel, the following vulnerability has been resolved:
ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs
The dreamcastcard->timer could schedule the spu_dma_work and the
spu_dma_work could also arm the dreamcastcard->timer.
When the snd_pcm_substream is closing, the aica_channel will be
deallocated. But it could still be dereferenced in the worker
thread. The reason is that del_timer() will return directly
regardless of whether the timer handler is running or not and
the worker could be rescheduled in the timer handler. As a result,
the UAF bug will happen. The racy situation is shown below:
(Thread 1) | (Thread 2)
snd_aicapcm_pcm_close() |
... | run_spu_dma() //worker
| mod_timer()
flush_work() |
del_timer() | aica_period_elapsed() //timer
kfree(dreamcastcard->channel) | schedule_work()
| run_spu_dma() //worker
... | dreamcastcard->channel-> //USE
In order to mitigate this bug and other possible corner cases,
call mod_timer() conditionally in run_spu_dma(), then implement
PCM sync_stop op to cancel both the timer and worker. The sync_stop
op will be called from PCM core appropriately when needed.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
03 Feb 2025, 14:32
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
First Time |
Linux linux Kernel
Linux Debian debian Linux Debian |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
References | () https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457 - Patch | |
References | () https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04 - Patch | |
References | () https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2 - Patch | |
References | () https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901 - Patch | |
References | () https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5 - Patch | |
References | () https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046 - Patch | |
References | () https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845 - Patch | |
References | () https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3 - Patch | |
References | () https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* |
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457 - | |
References | () https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04 - | |
References | () https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2 - | |
References | () https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901 - | |
References | () https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5 - | |
References | () https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046 - | |
References | () https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845 - | |
References | () https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3 - | |
References | () https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2 - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Apr 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Apr 2024, 15:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Apr 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-01 09:15
Updated : 2025-02-03 14:32
NVD link : CVE-2024-26654
Mitre link : CVE-2024-26654
CVE.ORG link : CVE-2024-26654
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-416
Use After Free