- Description
- In the Linux kernel, the following vulnerability has been resolved: Both cadence-quadspi ->runtime_suspend() and ->runtime_resume() implementations start with: struct cqspi_st *cqspi = dev_get_drvdata(dev); struct spi_controller *host = dev_get_drvdata(dev); This obviously cannot be correct, unless "struct cqspi_st" is the first member of " struct spi_controller", or the other way around, but it is not the case. "struct spi_controller" is allocated by devm_spi_alloc_host(), which allocates an extra amount of memory for private data, used to store "struct cqspi_st". The ->probe() function of the cadence-quadspi driver then sets the device drvdata to store the address of the "struct cqspi_st" structure. Therefore: struct cqspi_st *cqspi = dev_get_drvdata(dev); is correct, but: struct spi_controller *host = dev_get_drvdata(dev); is not, as it makes "host" point not to a "struct spi_controller" but to the same "struct cqspi_st" structure as above. This obviously leads to bad things (memory corruption, kernel crashes) directly during ->probe(), as ->probe() enables the device using PM runtime, leading the ->runtime_resume() hook being called, which in turns calls spi_controller_resume() with the wrong pointer. This has at least been reported [0] to cause a kernel crash, but the exact behavior will depend on the memory contents. [0] https://lore.kernel.org/all/20240226121803.5a7r5wkpbbowcxgx@dhruva/ This issue potentially affects all platforms that are currently using the cadence-quadspi driver.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- nvd@nist.gov
- CWE-787
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "584D76D2-1164-4D5F-A720-182A249B363A",
"versionEndExcluding": "6.6.21",
"versionStartIncluding": "6.4"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827",
"versionEndExcluding": "6.7.9",
"versionStartIncluding": "6.7"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.19.283:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D218D46E-9A95-4C75-A4D1-2C8957EFF613"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.4.243:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1F43B313-8B49-45C5-BA3F-43A00C1ABFDF"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.10.180:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E57BBF5A-3C2F-4683-90E9-C55C20DA0392"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15.111:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B8400C3E-16EB-4BE1-BFF2-F165B9C6C2DA"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1.28:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "063461C2-6DB7-4D4D-90A5-FF26944C693A"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2.15:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4CB13E07-8733-47AA-B47A-ABC9AA44E4F5"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7E9ED291-2EE9-4BE1-8925-FD7F622D1012"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C"
}
],
"operator": "OR"
}
]
}
]