Skip to main content

CVE-2024-46674: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-46674cvecve-2024-46674
Published: Fri Sep 13 2024 (09/13/2024, 05:29:10 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: st: fix probed platform device ref count on probe error path The probe function never performs any paltform device allocation, thus error path "undo_platform_dev_alloc" is entirely bogus. It drops the reference count from the platform device being probed. If error path is triggered, this will lead to unbalanced device reference counts and premature release of device resources, thus possible use-after-free when releasing remaining devm-managed resources.

AI-Powered Analysis

AILast updated: 06/29/2025, 00:10:25 UTC

Technical Analysis

CVE-2024-46674 is a vulnerability identified in the Linux kernel's USB subsystem, specifically within the DesignWare Core USB3 (dwc3) driver for the ST platform. The issue arises in the probe function responsible for initializing the platform device. The probe function incorrectly handles error paths related to device reference counting. Specifically, it attempts to decrement the reference count of a platform device that was never allocated during the probe process. This results in unbalanced device reference counts, leading to a premature release of device resources. Consequently, this can cause a use-after-free condition when the system later attempts to release remaining device-managed (devm) resources. Use-after-free vulnerabilities are critical because they can lead to undefined behavior, including kernel crashes, memory corruption, or potentially arbitrary code execution within the kernel context. Although no known exploits are currently reported in the wild, the nature of this vulnerability means that an attacker with the ability to trigger the probe error path—likely requiring local access or specific hardware conditions—could exploit it to destabilize the system or escalate privileges. The vulnerability affects specific versions of the Linux kernel identified by the commit hash f83fca0707c66e36f14efef7f68702cb12de70b7, and it was publicly disclosed on September 13, 2024. The fix involves correcting the erroneous reference count decrement in the error handling path to ensure proper resource management and prevent premature device resource release.

Potential Impact

For European organizations, the impact of CVE-2024-46674 depends largely on their use of Linux-based systems, particularly those utilizing the affected USB drivers and hardware platforms. Many enterprises, government agencies, and critical infrastructure operators in Europe rely on Linux servers, embedded devices, and workstations. A successful exploitation could lead to kernel crashes causing denial of service, or in worst cases, privilege escalation allowing attackers to gain root-level access. This could compromise confidentiality, integrity, and availability of critical systems. Industrial control systems, telecommunications infrastructure, and cloud service providers using affected Linux kernels could be particularly vulnerable. Given the widespread use of Linux in European data centers and embedded devices, the vulnerability poses a moderate to high risk if exploited. However, exploitation likely requires local access or specific hardware conditions, somewhat limiting remote attack vectors. Nonetheless, the potential for system instability and privilege escalation makes it a significant concern for organizations handling sensitive data or critical operations.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that address this vulnerability as soon as they become available. Since the issue lies in the USB driver’s probe function, organizations should audit their systems to identify devices using the dwc3 ST platform driver and assess exposure. For embedded or specialized devices, coordinate with hardware vendors to ensure firmware and kernel updates are deployed. Additionally, implement strict access controls to limit local user privileges and reduce the risk of unauthorized users triggering the vulnerable code path. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), and enable security modules like SELinux or AppArmor to mitigate exploitation impact. Monitoring kernel logs for unusual USB device errors or crashes can help detect attempted exploitation. Finally, maintain an up-to-date inventory of Linux kernel versions in use and integrate vulnerability scanning into patch management workflows to ensure timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.247Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0f58

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/29/2025, 12:10:25 AM

Last updated: 7/31/2025, 11:44:30 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats