Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-26749
HistoryApr 03, 2024 - 12:00 a.m.

CVE-2024-26749

2024-04-0300:00:00
ubuntu.com
ubuntu.com
8
linux kernel
usb
cdns3
vulnerability
use-after-free

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.3%

In the Linux kernel, the following vulnerability has been resolved: usb:
cdns3: fixed memory use after free at cdns3_gadget_ep_disable() …
cdns3_gadget_ep_free_request(&priv_ep->endpoint, &priv_req->request);
list_del_init(&priv_req->list); … ‘priv_req’ actually free at
cdns3_gadget_ep_free_request(). But list_del_init() use priv_req->list
after it. [ 1542.642868][ T534] BUG: KFENCE: use-after-free read in
__list_del_entry_valid+0x10/0xd4 [ 1542.642868][ T534] [ 1542.653162][
T534] Use-after-free read at 0x000000009ed0ba99 (in kfence-#3): [
1542.660311][ T534] __list_del_entry_valid+0x10/0xd4 [ 1542.665375][ T534]
cdns3_gadget_ep_disable+0x1f8/0x388 [cdns3] [ 1542.671571][ T534]
usb_ep_disable+0x44/0xe4 [ 1542.675948][ T534]
ffs_func_eps_disable+0x64/0xc8 [ 1542.680839][ T534]
ffs_func_set_alt+0x74/0x368 [ 1542.685478][ T534]
ffs_func_disable+0x18/0x28 Move list_del_init() before
cdns3_gadget_ep_free_request() to resolve this problem.

Rows per page:
1-10 of 661

References

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.3%