Skip to main content

CVE-2024-58055: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-58055cvecve-2024-58055
Published: Thu Mar 06 2025 (03/06/2025, 15:53:58 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_tcm: Don't free command immediately Don't prematurely free the command. Wait for the status completion of the sense status. It can be freed then. Otherwise we will double-free the command.

AI-Powered Analysis

AILast updated: 06/28/2025, 05:40:34 UTC

Technical Analysis

CVE-2024-58055 is a vulnerability identified in the Linux kernel's USB gadget subsystem, specifically within the f_tcm (Function Transport Class Mass Storage) driver. The issue arises from improper memory management where a command structure is prematurely freed before the completion of the sense status operation. In detail, the kernel code was freeing the command immediately after its issuance instead of waiting for the status completion callback. This premature freeing leads to a double-free condition when the sense status completion tries to free the same command again. Double-free vulnerabilities can cause undefined behavior including kernel crashes (denial of service), memory corruption, or potentially arbitrary code execution if exploited correctly. The vulnerability affects multiple versions of the Linux kernel as indicated by the repeated commit hash references, suggesting a flaw in a specific code revision or range of revisions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability was publicly disclosed on March 6, 2025, and a patch has been applied to correct the timing of the command freeing to occur only after the sense status completion, preventing the double-free condition. This vulnerability is technical and low-level, affecting the kernel's USB gadget functionality, which is used in embedded devices, development boards, and potentially in some server or desktop environments that utilize USB gadget drivers for device emulation or communication.

Potential Impact

For European organizations, the impact of CVE-2024-58055 depends largely on their use of Linux systems that employ the USB gadget f_tcm driver. Organizations using embedded Linux devices, IoT gateways, or specialized hardware that rely on USB gadget functionality could be at risk. Exploitation could lead to kernel crashes causing denial of service, which may disrupt critical services or industrial control systems. In worst-case scenarios, if an attacker can leverage the double-free to execute arbitrary code in kernel space, it could lead to full system compromise, data breaches, or lateral movement within networks. Given the Linux kernel's widespread use across servers, desktops, and embedded systems in Europe, the vulnerability poses a moderate risk, especially in sectors like manufacturing, telecommunications, and critical infrastructure where embedded Linux devices are prevalent. However, the lack of known exploits and the technical complexity of triggering this vulnerability reduce immediate risk. Still, unpatched systems remain vulnerable to future exploit development, which could impact confidentiality, integrity, and availability of affected systems.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that address CVE-2024-58055 as soon as they become available from their Linux distribution vendors. For embedded and IoT devices, firmware updates incorporating the patched kernel should be deployed promptly. Organizations should audit their environments to identify systems using the USB gadget f_tcm driver and assess exposure. Where patching is delayed, consider disabling USB gadget functionality if not required, or restricting physical and logical access to USB interfaces to reduce exploitation risk. Implement kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), and enable kernel memory protection features like Kernel Page Table Isolation (KPTI) and Control Flow Integrity (CFI) where supported. Monitoring kernel logs for unusual USB gadget activity and employing intrusion detection systems that can detect anomalous kernel behavior may help in early detection of exploitation attempts. Finally, maintain a robust vulnerability management process to track updates and advisories related to Linux kernel vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-03-06T15:52:09.179Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde22f

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 5:40:34 AM

Last updated: 8/6/2025, 5:41:03 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats