{"id":"CVE-2024-26748","summary":"usb: cdns3: fix memory double free when handle zero packet","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: fix memory double free when handle zero packet\n\n829  if (request-\u003ecomplete) {\n830          spin_unlock(&priv_dev-\u003elock);\n831          usb_gadget_giveback_request(&priv_ep-\u003eendpoint,\n832                                    request);\n833          spin_lock(&priv_dev-\u003elock);\n834  }\n835\n836  if (request-\u003ebuf == priv_dev-\u003ezlp_buf)\n837      cdns3_gadget_ep_free_request(&priv_ep-\u003eendpoint, request);\n\nDriver append an additional zero packet request when queue a packet, which\nlength mod max packet size is 0. When transfer complete, run to line 831,\nusb_gadget_giveback_request() will free this requestion. 836 condition is\ntrue, so cdns3_gadget_ep_free_request() free this request again.\n\nLog:\n\n[ 1920.140696][  T150] BUG: KFENCE: use-after-free read in cdns3_gadget_giveback+0x134/0x2c0 [cdns3]\n[ 1920.140696][  T150]\n[ 1920.151837][  T150] Use-after-free read at 0x000000003d1cd10b (in kfence-#36):\n[ 1920.159082][  T150]  cdns3_gadget_giveback+0x134/0x2c0 [cdns3]\n[ 1920.164988][  T150]  cdns3_transfer_completed+0x438/0x5f8 [cdns3]\n\nAdd check at line 829, skip call usb_gadget_giveback_request() if it is\nadditional zero length packet request. Needn't call\nusb_gadget_giveback_request() because it is allocated in this driver.","modified":"2026-04-02T10:05:46.950071Z","published":"2024-04-03T17:00:35.087Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2190-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26748.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1e204a8e9eb514e22a6567fb340ebb47df3f3a48"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3a2a909942b5335b7ea66366d84261b3ed5f89c8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5fd9e45f1ebcd57181358af28506e8a661a260b3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/70e8038813f9d3e72df966748ebbc40efe466019"},{"type":"WEB","url":"https://git.kernel.org/stable/c/92d20406a3d4ff3e8be667c79209dc9ed31df5b3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9a52b694b066f299d8b9800854a8503457a8b64c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aad6132ae6e4809e375431f8defd1521985e44e7"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26748.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26748"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7733f6c32e36ff9d7adadf40001039bf219b1cbe"},{"fixed":"aad6132ae6e4809e375431f8defd1521985e44e7"},{"fixed":"1e204a8e9eb514e22a6567fb340ebb47df3f3a48"},{"fixed":"3a2a909942b5335b7ea66366d84261b3ed5f89c8"},{"fixed":"9a52b694b066f299d8b9800854a8503457a8b64c"},{"fixed":"70e8038813f9d3e72df966748ebbc40efe466019"},{"fixed":"92d20406a3d4ff3e8be667c79209dc9ed31df5b3"},{"fixed":"5fd9e45f1ebcd57181358af28506e8a661a260b3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26748.json"}}],"schema_version":"1.7.5"}