First published: Mon Apr 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs The dreamcastcard->timer could schedule the spu_dma_work and the spu_dma_work could also arm the dreamcastcard->timer. When the snd_pcm_substream is closing, the aica_channel will be deallocated. But it could still be dereferenced in the worker thread. The reason is that del_timer() will return directly regardless of whether the timer handler is running or not and the worker could be rescheduled in the timer handler. As a result, the UAF bug will happen. The racy situation is shown below: (Thread 1) | (Thread 2) snd_aicapcm_pcm_close() | ... | run_spu_dma() //worker | mod_timer() flush_work() | del_timer() | aica_period_elapsed() //timer kfree(dreamcastcard->channel) | schedule_work() | run_spu_dma() //worker ... | dreamcastcard->channel-> //USE In order to mitigate this bug and other possible corner cases, call mod_timer() conditionally in run_spu_dma(), then implement PCM sync_stop op to cancel both the timer and worker. The sync_stop op will be called from PCM core appropriately when needed.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 | |
Linux Kernel | >=2.6.23<4.19.312 | |
Linux Kernel | >=4.20<5.4.274 | |
Linux Kernel | >=5.5<5.10.215 | |
Linux Kernel | >=5.11<5.15.154 | |
Linux Kernel | >=5.16<6.1.84 | |
Linux Kernel | >=6.2<6.6.24 | |
Linux Kernel | >=6.7<6.7.12 | |
Linux Kernel | >=6.8<6.8.3 | |
Linux Kernel | =6.9-rc1 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26654 is classified as a medium severity vulnerability in the Linux kernel affecting ALSA.
To remediate CVE-2024-26654, update to the following versions of the Linux package: 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.
The impacts of CVE-2024-26654 can include user-after-free errors potentially leading to memory corruption.
If you are using an affected Linux kernel version prior to the fixed releases, your system may be vulnerable to CVE-2024-26654.
CVE-2024-26654 was reported in early 2024 as a vulnerability in the Linux kernel related to ALSA.