Skip to main content

CVE-2024-46798: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-46798cvecve-2024-46798
Published: Wed Sep 18 2024 (09/18/2024, 07:12:52 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object When using kernel with the following extra config, - CONFIG_KASAN=y - CONFIG_KASAN_GENERIC=y - CONFIG_KASAN_INLINE=y - CONFIG_KASAN_VMALLOC=y - CONFIG_FRAME_WARN=4096 kernel detects that snd_pcm_suspend_all() access a freed 'snd_soc_pcm_runtime' object when the system is suspended, which leads to a use-after-free bug: [ 52.047746] BUG: KASAN: use-after-free in snd_pcm_suspend_all+0x1a8/0x270 [ 52.047765] Read of size 1 at addr ffff0000b9434d50 by task systemd-sleep/2330 [ 52.047785] Call trace: [ 52.047787] dump_backtrace+0x0/0x3c0 [ 52.047794] show_stack+0x34/0x50 [ 52.047797] dump_stack_lvl+0x68/0x8c [ 52.047802] print_address_description.constprop.0+0x74/0x2c0 [ 52.047809] kasan_report+0x210/0x230 [ 52.047815] __asan_report_load1_noabort+0x3c/0x50 [ 52.047820] snd_pcm_suspend_all+0x1a8/0x270 [ 52.047824] snd_soc_suspend+0x19c/0x4e0 The snd_pcm_sync_stop() has a NULL check on 'substream->runtime' before making any access. So we need to always set 'substream->runtime' to NULL everytime we kfree() it.

AI-Powered Analysis

AILast updated: 06/29/2025, 01:56:20 UTC

Technical Analysis

CVE-2024-46798 is a use-after-free (UAF) vulnerability identified in the Linux kernel's ALSA System on Chip (ASoC) sound subsystem, specifically within the Dynamic Audio Power Management (DAPM) component. The flaw arises when the snd_pcm_suspend_all() function accesses a freed snd_soc_pcm_runtime object during system suspend operations. This occurs under kernel configurations that enable Kernel Address Sanitizer (KASAN) features (CONFIG_KASAN=y, CONFIG_KASAN_GENERIC=y, CONFIG_KASAN_INLINE=y, CONFIG_KASAN_VMALLOC=y) and a frame warning setting (CONFIG_FRAME_WARN=4096). The vulnerability is triggered because the snd_pcm_suspend_all() function attempts to access memory that has already been freed, leading to a use-after-free condition. The root cause is that the substream->runtime pointer is not set to NULL after its associated memory is freed (kfree), which would otherwise prevent further access. The snd_pcm_sync_stop() function includes a NULL check on substream->runtime before accessing it, but this safeguard is missing in snd_pcm_suspend_all(). This flaw can lead to kernel crashes or potentially allow an attacker to execute arbitrary code or escalate privileges by exploiting the corrupted memory state. The vulnerability was detected by KASAN during system suspend and is related to the handling of audio PCM runtime objects in the kernel's sound subsystem. The fix involves ensuring that substream->runtime is set to NULL immediately after the memory is freed to prevent use-after-free access. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with the affected ASoC sound subsystem configurations. The impact includes potential system instability, crashes during suspend/resume cycles, and in worst cases, privilege escalation or arbitrary code execution if exploited by a malicious actor. This could affect servers, desktops, and embedded devices relying on Linux with sound subsystem usage, particularly in sectors like telecommunications, manufacturing, and critical infrastructure where Linux is prevalent. Disruption of audio services may also affect user experience and operational continuity in multimedia or communication systems. Additionally, exploitation could be leveraged as a foothold for further lateral movement or persistence within corporate networks. Since the vulnerability requires specific kernel configurations and relates to suspend operations, it may be more relevant for laptops, embedded devices, or specialized Linux distributions used in industrial or enterprise environments. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means organizations should prioritize patching to maintain system integrity and availability.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2024-46798 as soon as they become available from trusted sources or Linux distribution vendors. 2. For organizations using custom or embedded Linux kernels, ensure kernel configurations are reviewed and updated to include the fix, particularly focusing on the ASoC sound subsystem and suspend/resume code paths. 3. Temporarily disable or avoid using suspend/resume features on affected systems if patching is not immediately feasible, to reduce the risk of triggering the vulnerability. 4. Implement kernel hardening techniques such as enabling KASAN in testing environments to detect similar memory corruption issues proactively. 5. Monitor system logs for KASAN or kernel warnings related to snd_pcm_suspend_all or snd_soc_pcm_runtime objects to detect potential exploitation attempts. 6. Restrict access to systems with vulnerable kernels to trusted users and networks to minimize attack surface. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation impacts. 8. Engage with Linux distribution security advisories and subscribe to vulnerability notifications to stay informed about patch releases and exploitation developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.280Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9827c4522896dcbe1345

Added to database: 5/21/2025, 9:08:55 AM

Last enriched: 6/29/2025, 1:56:20 AM

Last updated: 8/2/2025, 12:56:45 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats