CVE-2024-56555

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56555
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56555.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-56555
Downstream
Published
2024-12-27T14:23:01.650Z
Modified
2025-12-05T07:47:26.988607Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
binder: fix OOB in binder_add_freeze_work()
Details

In the Linux kernel, the following vulnerability has been resolved:

binder: fix OOB in binderaddfreeze_work()

In binderaddfreezework() we iterate over the proc->nodes with the proc->innerlock held. However, this lock is temporarily dropped to acquire the node->lock first (lock nesting order). This can race with binderdeferredrelease() which removes the nodes from the proc->nodes rbtree and adds them into binderdeadnodes list. This leads to a broken iteration in binderaddfreezework() as rbnext() will use data from binderdeadnodes, triggering an out-of-bounds access:

================================================================== BUG: KASAN: global-out-of-bounds in rb_next+0xfc/0x124 Read of size 8 at addr ffffcb84285f7170 by task freeze/660

CPU: 8 UID: 0 PID: 660 Comm: freeze Not tainted 6.11.0-07343-ga727812a8d45 #18 Hardware name: linux,dummy-virt (DT) Call trace: rbnext+0xfc/0x124 binderaddfreezework+0x344/0x534 binderioctl+0x1e70/0x25ac _arm64sysioctl+0x124/0x190

The buggy address belongs to the variable: binderdeadnodes+0x10/0x40 [...] ==================================================================

This is possible because proc->nodes (rbtree) and binderdeadnodes (list) share entries in binder_node through a union:

struct binder_node {
[...]
    union {
        struct rb_node rb_node;
        struct hlist_node dead_node;
    };

Fix the race by checking that the proc is still alive. If not, simply break out of the iteration.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56555.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d579b04a52a183db47dfcb7a44304d7747d551e1
Fixed
6b1be1da1f8279cf091266e71b5153c5b02aaff6
Fixed
011e69a1b23011c0db3af4b8293fdd4522cc97b0

Affected versions

v6.*

v6.11
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.2
v6.12.3

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.12.0
Fixed
6.12.4