CVE-2024-53227

In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Fix use-after-free in bfad_im_module_exit() BUG: KASAN: slab-use-after-free in __lock_acquire+0x2aca/0x3a20 Read of size 8 at addr ffff8881082d80c8 by task modprobe/25303 Call Trace: <TASK> dump_stack_lvl+0x95/0xe0 print_report+0xcb/0x620 kasan_report+0xbd/0xf0 __lock_acquire+0x2aca/0x3a20 lock_acquire+0x19b/0x520 _raw_spin_lock+0x2b/0x40 attribute_container_unregister+0x30/0x160 fc_release_transport+0x19/0x90 [scsi_transport_fc] bfad_im_module_exit+0x23/0x60 [bfa] bfad_init+0xdb/0xff0 [bfa] do_one_initcall+0xdc/0x550 do_init_module+0x22d/0x6b0 load_module+0x4e96/0x5ff0 init_module_from_file+0xcd/0x130 idempotent_init_module+0x330/0x620 __x64_sys_finit_module+0xb3/0x110 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f </TASK> Allocated by task 25303: kasan_save_stack+0x24/0x50 kasan_save_track+0x14/0x30 __kasan_kmalloc+0x7f/0x90 fc_attach_transport+0x4f/0x4740 [scsi_transport_fc] bfad_im_module_init+0x17/0x80 [bfa] bfad_init+0x23/0xff0 [bfa] do_one_initcall+0xdc/0x550 do_init_module+0x22d/0x6b0 load_module+0x4e96/0x5ff0 init_module_from_file+0xcd/0x130 idempotent_init_module+0x330/0x620 __x64_sys_finit_module+0xb3/0x110 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 25303: kasan_save_stack+0x24/0x50 kasan_save_track+0x14/0x30 kasan_save_free_info+0x3b/0x60 __kasan_slab_free+0x38/0x50 kfree+0x212/0x480 bfad_im_module_init+0x7e/0x80 [bfa] bfad_init+0x23/0xff0 [bfa] do_one_initcall+0xdc/0x550 do_init_module+0x22d/0x6b0 load_module+0x4e96/0x5ff0 init_module_from_file+0xcd/0x130 idempotent_init_module+0x330/0x620 __x64_sys_finit_module+0xb3/0x110 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f Above issue happens as follows: bfad_init error = bfad_im_module_init() fc_release_transport(bfad_im_scsi_transport_template); if (error) goto ext; ext: bfad_im_module_exit(); fc_release_transport(bfad_im_scsi_transport_template); --> Trigger double release Don't call bfad_im_module_exit() if bfad_im_module_init() failed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

10 Jan 2025, 18:06

Type Values Removed Values Added
CWE CWE-416
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: bfa: Se corrige el use-after-free en bfad_im_module_exit() ERROR: KASAN: use-after-free de losa en __lock_acquire+0x2aca/0x3a20 Lectura de tamaño 8 en la dirección ffff8881082d80c8 por la tarea modprobe/25303 Seguimiento de llamadas: dump_stack_lvl+0x95/0xe0 print_report+0xcb/0x620 kasan_report+0xbd/0xf0 __lock_acquire+0x2aca/0x3a20 lock_acquire+0x19b/0x520 _raw_spin_lock+0x2b/0x40 attribute_container_unregister+0x30/0x160 Asignado por tarea 25303: pila de guardado de kasan+0x24/0x50 pista de guardado de kasan+0x14/0x30 __kasan_kmalloc+0x7f/0x90 transporte de acoplamiento de fc+0x4f/0x4740 [transporte de scsi_fc] inicio del módulo de bfad_im+0x17/0x80 [bfa] inicio del módulo de bfad_init+0x23/0xff0 [bfa] hacer una llamada de inicio+0xdc/0x550 hacer el módulo de inicio+0x22d/0x6b0 módulo de carga+0x4e96/0x5ff0 módulo de inicio desde el archivo+0xcd/0x130 módulo de inicio idempotente+0x330/0x620 __x64_sys_finit_module+0xb3/0x110 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f Liberado por la tarea 25303: kasan_save_stack+0x24/0x50 kasan_save_track+0x14/0x30 kasan_save_free_info+0x3b/0x60 __kasan_slab_free+0x38/0x50 kfree+0x212/0x480 bfad_im_module_init+0x7e/0x80 [bfa] bfad_init+0x23/0xff0 [bfa] do_one_initcall+0xdc/0x550 do_init_module+0x22d/0x6b0 load_module+0x4e96/0x5ff0 init_module_from_file+0xcd/0x130 idempotent_init_module+0x330/0x620 __x64_sys_finit_module+0xb3/0x110 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f El problema anterior ocurre de la siguiente manera: bfad_init error = bfad_im_module_init() fc_release_transport(bfad_im_scsi_transport_template); if (error) goto ext; ext: bfad_im_module_exit(); fc_release_transport(bfad_im_scsi_transport_template); --&gt; Disparador de doble liberación No llame a bfad_im_module_exit() si bfad_im_module_init() falló.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0ceac8012d3ddea3317f0d82934293d05feb8af1 - () https://git.kernel.org/stable/c/0ceac8012d3ddea3317f0d82934293d05feb8af1 - Patch
References () https://git.kernel.org/stable/c/178b8f38932d635e90f5f0e9af1986c6f4a89271 - () https://git.kernel.org/stable/c/178b8f38932d635e90f5f0e9af1986c6f4a89271 - Patch
References () https://git.kernel.org/stable/c/1ffdde30a90bf8efe8f270407f486706962b3292 - () https://git.kernel.org/stable/c/1ffdde30a90bf8efe8f270407f486706962b3292 - Patch
References () https://git.kernel.org/stable/c/3932c753f805a02e9364a4c58b590f21901f8490 - () https://git.kernel.org/stable/c/3932c753f805a02e9364a4c58b590f21901f8490 - Patch
References () https://git.kernel.org/stable/c/8f5a97443b547b4c83f876f1d6a11df0f1fd4efb - () https://git.kernel.org/stable/c/8f5a97443b547b4c83f876f1d6a11df0f1fd4efb - Patch
References () https://git.kernel.org/stable/c/a2b5035ab0e368e8d8a371e27fbc72f133c0bd40 - () https://git.kernel.org/stable/c/a2b5035ab0e368e8d8a371e27fbc72f133c0bd40 - Patch
References () https://git.kernel.org/stable/c/c28409f851abd93b37969cac7498828ad533afd9 - () https://git.kernel.org/stable/c/c28409f851abd93b37969cac7498828ad533afd9 - Patch
References () https://git.kernel.org/stable/c/e76181a5be90abcc3ed8a300bd13878aa214d022 - () https://git.kernel.org/stable/c/e76181a5be90abcc3ed8a300bd13878aa214d022 - Patch
References () https://git.kernel.org/stable/c/ef2c2580189ea88a0dcaf56eb3a565763a900edb - () https://git.kernel.org/stable/c/ef2c2580189ea88a0dcaf56eb3a565763a900edb - Patch
First Time Linux linux Kernel
Linux

27 Dec 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 14:15

Updated : 2025-02-11 16:15


NVD link : CVE-2024-53227

Mitre link : CVE-2024-53227

CVE.ORG link : CVE-2024-53227


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free