Skip to main content

CVE-2024-46675: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-46675cvecve-2024-46675
Published: Fri Sep 13 2024 (09/13/2024, 05:29:10 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: Prevent USB core invalid event buffer address access This commit addresses an issue where the USB core could access an invalid event buffer address during runtime suspend, potentially causing SMMU faults and other memory issues in Exynos platforms. The problem arises from the following sequence. 1. In dwc3_gadget_suspend, there is a chance of a timeout when moving the USB core to the halt state after clearing the run/stop bit by software. 2. In dwc3_core_exit, the event buffer is cleared regardless of the USB core's status, which may lead to an SMMU faults and other memory issues. if the USB core tries to access the event buffer address. To prevent this hardware quirk on Exynos platforms, this commit ensures that the event buffer address is not cleared by software when the USB core is active during runtime suspend by checking its status before clearing the buffer address.

AI-Powered Analysis

AILast updated: 06/29/2025, 00:10:37 UTC

Technical Analysis

CVE-2024-46675 is a vulnerability identified in the Linux kernel's USB core driver, specifically affecting the DesignWare Core USB3 (dwc3) controller implementation on Exynos platforms. The vulnerability arises during the runtime suspend process of the USB core. The issue occurs because the USB core may attempt to access an invalid event buffer address if the software clears the event buffer address prematurely while the USB core is still active. This sequence can lead to System Memory Management Unit (SMMU) faults and other memory-related errors. The root cause is a timing window where the USB core is transitioning to a halt state but may experience a timeout, and the event buffer is cleared regardless of the USB core's actual status. This improper clearing can cause the hardware to access invalid memory addresses, potentially leading to system instability or crashes. The patch for this vulnerability ensures that the event buffer address is only cleared after verifying that the USB core is inactive, preventing invalid memory access during runtime suspend. This fix addresses a hardware quirk specific to Exynos platforms, which are Samsung's ARM-based SoCs commonly used in mobile and embedded devices. Although the vulnerability is specific to certain hardware, it resides in the Linux kernel codebase, which is widely used across many devices and distributions. No known exploits are currently reported in the wild, and the vulnerability was published on September 13, 2024.

Potential Impact

For European organizations, the impact of CVE-2024-46675 depends largely on their use of Linux-based systems running on Exynos hardware or similar ARM-based platforms incorporating the affected USB controller. Organizations deploying embedded systems, mobile devices, or specialized hardware using Exynos SoCs could experience system instability, crashes, or denial of service conditions due to SMMU faults triggered by this vulnerability. This could affect operational continuity, especially in sectors relying on embedded Linux devices such as telecommunications, industrial control systems, and IoT deployments. While the vulnerability does not directly expose data confidentiality or integrity risks, the potential for system crashes or denial of service could disrupt critical services or processes. Since the flaw is hardware-specific and requires the USB core to enter a runtime suspend state, exploitation is somewhat constrained but still relevant for affected platforms. European organizations using standard x86 Linux servers or non-Exynos ARM platforms are unlikely to be impacted. However, given the widespread use of Linux in various environments, organizations should assess their hardware inventory carefully. The absence of known exploits reduces immediate risk but does not eliminate the need for timely patching to prevent future exploitation or accidental system failures.

Mitigation Recommendations

1. Apply the official Linux kernel patch that addresses CVE-2024-46675 as soon as it becomes available in your distribution's updates. This patch ensures the event buffer address is not cleared while the USB core is active, preventing invalid memory access. 2. Identify and inventory all systems running Linux kernels on Exynos platforms or devices using the dwc3 USB controller to prioritize patch deployment. 3. For embedded or mobile devices where kernel updates may be delayed, consider implementing runtime monitoring for USB subsystem errors or SMMU faults to detect potential exploitation or instability early. 4. Coordinate with hardware vendors and device manufacturers to obtain updated firmware or kernel versions that include the fix. 5. Limit runtime suspend states on affected devices if feasible, as a temporary workaround to reduce exposure until patches are applied. 6. Conduct thorough testing of updated kernels in staging environments to ensure stability and compatibility, especially for critical embedded systems. 7. Maintain strong operational procedures for incident response to quickly address any system crashes or anomalies potentially related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.247Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0f7a

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/29/2025, 12:10:37 AM

Last updated: 7/31/2025, 9:56:38 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats