lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024052115-CVE-2023-52855-3a55@gregkh>
Date: Tue, 21 May 2024 17:32:31 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2023-52855: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency

In _dwc2_hcd_urb_enqueue(), "urb->hcpriv = NULL" is executed without
holding the lock "hsotg->lock". In _dwc2_hcd_urb_dequeue():

    spin_lock_irqsave(&hsotg->lock, flags);
    ...
	if (!urb->hcpriv) {
		dev_dbg(hsotg->dev, "## urb->hcpriv is NULL ##\n");
		goto out;
	}
    rc = dwc2_hcd_urb_dequeue(hsotg, urb->hcpriv); // Use urb->hcpriv
    ...
out:
    spin_unlock_irqrestore(&hsotg->lock, flags);

When _dwc2_hcd_urb_enqueue() and _dwc2_hcd_urb_dequeue() are
concurrently executed, the NULL check of "urb->hcpriv" can be executed
before "urb->hcpriv = NULL". After urb->hcpriv is NULL, it can be used
in the function call to dwc2_hcd_urb_dequeue(), which can cause a NULL
pointer dereference.

This possible bug is found by an experimental static analysis tool
developed by myself. This tool analyzes the locking APIs to extract
function pairs that can be concurrently executed, and then analyzes the
instructions in the paired functions to identify possible concurrency
bugs including data races and atomicity violations. The above possible
bug is reported, when my tool analyzes the source code of Linux 6.5.

To fix this possible bug, "urb->hcpriv = NULL" should be executed with
holding the lock "hsotg->lock". After using this patch, my tool never
reports the possible bug, with the kernelconfiguration allyesconfig for
x86_64. Because I have no associated hardware, I cannot test the patch
in runtime testing, and just verify it according to the code logic.

The Linux kernel CVE team has assigned CVE-2023-52855 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 4.2 with commit 33ad261aa62b and fixed in 4.14.330 with commit 14c9ec34e811
	Issue introduced in 4.2 with commit 33ad261aa62b and fixed in 4.19.299 with commit fed492aa6493
	Issue introduced in 4.2 with commit 33ad261aa62b and fixed in 5.4.261 with commit 64c47749fc75
	Issue introduced in 4.2 with commit 33ad261aa62b and fixed in 5.10.201 with commit bdb3dd409630
	Issue introduced in 4.2 with commit 33ad261aa62b and fixed in 5.15.139 with commit fcaafb574fc8
	Issue introduced in 4.2 with commit 33ad261aa62b and fixed in 6.1.63 with commit 6b21a2272885
	Issue introduced in 4.2 with commit 33ad261aa62b and fixed in 6.5.12 with commit 3e851a77a13c
	Issue introduced in 4.2 with commit 33ad261aa62b and fixed in 6.6.2 with commit a7bee9598afb
	Issue introduced in 4.2 with commit 33ad261aa62b and fixed in 6.7 with commit ef307bc6ef04

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2023-52855
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/usb/dwc2/hcd.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/14c9ec34e8118fbffd7f5431814d767726323e72
	https://git.kernel.org/stable/c/fed492aa6493a91a77ebd51da6fb939c98d94a0d
	https://git.kernel.org/stable/c/64c47749fc7507ed732e155c958253968c1d275e
	https://git.kernel.org/stable/c/bdb3dd4096302d6b87441fdc528439f171b04be6
	https://git.kernel.org/stable/c/fcaafb574fc88a52dce817f039f7ff2f9da38001
	https://git.kernel.org/stable/c/6b21a22728852d020a6658d39cd7bb7e14b07790
	https://git.kernel.org/stable/c/3e851a77a13ce944d703721793f49ee82622986d
	https://git.kernel.org/stable/c/a7bee9598afb38004841a41dd8fe68c1faff4e90
	https://git.kernel.org/stable/c/ef307bc6ef04e8c1ea843231db58e3afaafa9fa6

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ