CVE-2022-48838

Source
https://cve.org/CVERecord?id=CVE-2022-48838
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48838.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48838
Downstream
Related
Published
2024-07-16T12:25:09.859Z
Modified
2026-03-14T12:00:41.709718Z
Summary
usb: gadget: Fix use-after-free bug by not setting udc->dev.driver
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: Fix use-after-free bug by not setting udc->dev.driver

The syzbot fuzzer found a use-after-free bug:

BUG: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320 Read of size 8 at addr ffff88802b934098 by task udevd/3689

CPU: 2 PID: 3689 Comm: udevd Not tainted 5.17.0-rc4-syzkaller-00229-g4f12b742eb2b #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 Call Trace: <TASK> __dumpstack lib/dumpstack.c:88 [inline] dump_stacklvl+0xcd/0x134 lib/dumpstack.c:106 printaddressdescription.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255 __kasanreport mm/kasan/report.c:442 [inline] kasanreport.cold+0x83/0xdf mm/kasan/report.c:459 devuevent+0x712/0x780 drivers/base/core.c:2320 ueventshow+0x1b8/0x380 drivers/base/core.c:2391 devattrshow+0x4b/0x90 drivers/base/core.c:2094

Although the bug manifested in the driver core, the real cause was a race with the gadget core. dev_uevent() does:

if (dev->driver)
    add_uevent_var(env, "DRIVER=%s", dev->driver->name);

and between the test and the dereference of dev->driver, the gadget core sets dev->driver to NULL.

The race wouldn't occur if the gadget core registered its devices on a real bus, using the standard synchronization techniques of the driver core. However, it's not necessary to make such a large change in order to fix this bug; all we need to do is make sure that udc->dev.driver is always NULL.

In fact, there is no reason for udc->dev.driver ever to be set to anything, let alone to the value it currently gets: the address of the gadget's driver. After all, a gadget driver only knows how to manage a gadget, not how to manage a UDC.

This patch simply removes the statements in the gadget core that touch udc->dev.driver.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48838.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2ccea03a8f7ec93641791f2760d7cdc6cab6205f
Fixed
4325124dde6726267813c736fee61226f1d38f0b
Fixed
e2d3a7009e505e120805f449c832942660f3f7f3
Fixed
609a7119bffe3ddd7c93f2fa65be8917e02a0b7e
Fixed
2282a6eb6d4e118e294e43dcc421e0e0fe4040b5
Fixed
00bdd9bf1ac6d401ad926d3d8df41b9f1399f646
Fixed
2015c23610cd0efadaeca4d3a8d1dae9a45aa35a
Fixed
27d64436984fb8835a8b7e95993193cc478b162e
Fixed
16b1941eac2bd499f065a6739a40ce0011a3d740

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48838.json"