Skip to main content

CVE-2024-26875: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26875cvecve-2024-26875
Published: Wed Apr 17 2024 (04/17/2024, 10:27:33 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix uaf in pvr2_context_set_notify [Syzbot reported] BUG: KASAN: slab-use-after-free in pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35 Read of size 4 at addr ffff888113aeb0d8 by task kworker/1:1/26 CPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.8.0-rc1-syzkaller-00046-gf1a27f081c1f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Workqueue: usb_hub_wq hub_event Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc4/0x620 mm/kasan/report.c:488 kasan_report+0xda/0x110 mm/kasan/report.c:601 pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35 pvr2_context_notify drivers/media/usb/pvrusb2/pvrusb2-context.c:95 [inline] pvr2_context_disconnect+0x94/0xb0 drivers/media/usb/pvrusb2/pvrusb2-context.c:272 Freed by task 906: kasan_save_stack+0x33/0x50 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640 poison_slab_object mm/kasan/common.c:241 [inline] __kasan_slab_free+0x106/0x1b0 mm/kasan/common.c:257 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2121 [inline] slab_free mm/slub.c:4299 [inline] kfree+0x105/0x340 mm/slub.c:4409 pvr2_context_check drivers/media/usb/pvrusb2/pvrusb2-context.c:137 [inline] pvr2_context_thread_func+0x69d/0x960 drivers/media/usb/pvrusb2/pvrusb2-context.c:158 [Analyze] Task A set disconnect_flag = !0, which resulted in Task B's condition being met and releasing mp, leading to this issue. [Fix] Place the disconnect_flag assignment operation after all code in pvr2_context_disconnect() to avoid this issue.

AI-Powered Analysis

AILast updated: 06/29/2025, 19:42:07 UTC

Technical Analysis

CVE-2024-26875 is a use-after-free (UAF) vulnerability identified in the Linux kernel's media subsystem, specifically within the pvrusb2 driver which handles certain USB-based TV tuner devices. The flaw arises in the function pvr2_context_set_notify, where a race condition leads to a freed memory object being accessed subsequently. The vulnerability was detected by Syzbot's kernel fuzzing infrastructure and involves a slab-use-after-free error triggered during USB hub event handling. The root cause is a timing issue between two kernel worker tasks: Task A sets a disconnect_flag, which causes Task B to meet a condition that leads to releasing a memory pointer (mp). However, Task B continues to access this freed memory, causing a use-after-free. The fix involves reordering the disconnect_flag assignment to occur only after all other operations in pvr2_context_disconnect() complete, preventing premature freeing of resources. This vulnerability affects Linux kernel versions around 6.8.0-rc1 and likely other versions containing the vulnerable pvrusb2 driver code. The CVSS 3.1 score is 6.4 (medium severity), reflecting that exploitation requires local access with high privileges and high attack complexity, but can result in high confidentiality, integrity, and availability impact. No known exploits are currently reported in the wild. The vulnerability is classified under CWE-416 (Use After Free).

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected pvrusb2 media driver enabled, which is typically found on systems using USB TV tuner devices supported by this driver. Exploitation could allow a local privileged attacker to execute arbitrary code within kernel space, potentially leading to full system compromise, data leakage, or denial of service. This is particularly concerning for organizations relying on Linux-based infrastructure for media processing, embedded systems, or specialized hardware that includes these USB devices. Although exploitation requires local privileged access and has high attack complexity, the impact on confidentiality, integrity, and availability is high, meaning successful exploitation could severely disrupt critical services or expose sensitive data. European enterprises with Linux-based media servers, broadcast facilities, or research institutions using such hardware should be vigilant. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in environments where insider threats or advanced persistent threats (APTs) exist.

Mitigation Recommendations

1. Apply the official Linux kernel patches that reorder the disconnect_flag assignment in pvr2_context_disconnect() as soon as they become available from trusted Linux distributions or kernel maintainers. 2. Audit and inventory systems to identify those running vulnerable Linux kernel versions with the pvrusb2 driver enabled, especially those using USB TV tuner devices. 3. Restrict local privileged access to trusted personnel only, as exploitation requires high privileges. 4. Implement kernel lockdown features or mandatory access controls (e.g., SELinux, AppArmor) to limit kernel module interactions and reduce attack surface. 5. Monitor kernel logs and system behavior for anomalies related to USB device handling or unexpected kernel worker thread activity. 6. For critical systems where patching is delayed, consider disabling the pvrusb2 driver if the USB TV tuner functionality is not essential. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.185Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3e28

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:42:07 PM

Last updated: 7/30/2025, 4:44:06 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats