vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-26654): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:M/Au:S/C:C/I:C/A:C) | 04/01/2024 | 07/01/2024 | 02/19/2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs
The dreamcastcard->timer could schedule the spu_dma_work and the
spu_dma_work could also arm the dreamcastcard->timer.
When the snd_pcm_substream is closing, the aica_channel will be
deallocated. But it could still be dereferenced in the worker
thread. The reason is that del_timer() will return directly
regardless of whether the timer handler is running or not and
the worker could be rescheduled in the timer handler. As a result,
the UAF bug will happen. The racy situation is shown below:
(Thread 1) | (Thread 2)
snd_aicapcm_pcm_close() |
... | run_spu_dma() //worker
| mod_timer()
flush_work() |
del_timer() | aica_period_elapsed() //timer
kfree(dreamcastcard->channel) | schedule_work()
| run_spu_dma() //worker
... | dreamcastcard->channel-> //USE
In order to mitigate this bug and other possible corner cases,
call mod_timer() conditionally in run_spu_dma(), then implement
PCM sync_stop op to cancel both the timer and worker. The sync_stop
op will be called from PCM core appropriately when needed.
Solution(s)
References
- CVE-2024-26654
- https://attackerkb.com/topics/CVE-2024-26654
- UBUNTU-USN-6816-1
- UBUNTU-USN-6817-1
- UBUNTU-USN-6817-2
- UBUNTU-USN-6817-3
- UBUNTU-USN-6878-1
- UBUNTU-USN-6896-1
- UBUNTU-USN-6896-2
- UBUNTU-USN-6896-3
- UBUNTU-USN-6896-4
- UBUNTU-USN-6896-5
- UBUNTU-USN-6898-1
- UBUNTU-USN-6898-2
- UBUNTU-USN-6898-3
- UBUNTU-USN-6898-4
- UBUNTU-USN-6917-1
- UBUNTU-USN-6919-1
- UBUNTU-USN-6927-1
- UBUNTU-USN-6972-1
- UBUNTU-USN-6972-2
- UBUNTU-USN-6972-3
- UBUNTU-USN-6972-4
- UBUNTU-USN-6976-1
- UBUNTU-USN-7019-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.