CVE-2023-52478

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52478
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52478.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52478
Downstream
Related
Published
2024-02-29T05:43:10.698Z
Modified
2025-11-28T02:35:13.765276Z
Summary
HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
Details

In the Linux kernel, the following vulnerability has been resolved:

HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect

hidppconnectevent() has four time-of-check vs time-of-use (TOCTOU) races when it races with itself.

hidppconnectevent() primarily runs from a workqueue but it also runs on probe() and if a "device-connected" packet is received by the hw when the thread running hidppconnectevent() from probe() is waiting on the hw, then a second thread running hidppconnectevent() will be started from the workqueue.

This opens the following races (note the below code is simplified):

  1. Retrieving + printing the protocol (harmless race):

    if (!hidpp->protocolmajor) { hidpprootgetprotocolversion() hidpp->protocolmajor = response.rap.params[0]; }

We can actually see this race hit in the dmesg in the abrt output attached to rhbz#2227968:

[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected. [ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.

Testing with extra logging added has shown that after this the 2 threads take turn grabbing the hw access mutex (send_mutex) so they ping-pong through all the other TOCTOU cases managing to hit all of them:

  1. Updating the name to the HIDPP name (harmless race):

    if (hidpp->name == hdev->name) { ... hidpp->name = new_name; }

  2. Initializing the power_supply class for the battery (problematic!):

hidppinitializebattery() { if (hidpp->battery.ps) return 0;

probe_battery(); /* Blocks, threads take turns executing this */

hidpp->battery.desc.properties =
    devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

hidpp->battery.ps =
    devm_power_supply_register(&hidpp->hid_dev->dev,
                   &hidpp->battery.desc, cfg);

}

  1. Creating delayed input_device (potentially problematic):

    if (hidpp->delayed_input) return;

    hidpp->delayedinput = hidppallocate_input(hdev);

The really big problem here is 3. Hitting the race leads to the following sequence:

hidpp->battery.desc.properties =
    devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

hidpp->battery.ps =
    devm_power_supply_register(&hidpp->hid_dev->dev,
                   &hidpp->battery.desc, cfg);

...

hidpp->battery.desc.properties =
    devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

hidpp->battery.ps =
    devm_power_supply_register(&hidpp->hid_dev->dev,
                   &hidpp->battery.desc, cfg);

So now we have registered 2 power supplies for the same battery, which looks a bit weird from userspace's pov but this is not even the really big problem.

Notice how:

  1. This is all devm-maganaged
  2. The hidpp->battery.desc struct is shared between the 2 power supplies
  3. hidpp->battery.desc.properties points to the result from the second devm_kmemdup()

This causes a use after free scenario on USB disconnect of the receiver: 1. The last registered power supply class device gets unregistered 2. The memory from the last devmkmemdup() call gets freed, hidpp->battery.desc.properties now points to freed memory 3. The first registered power supply class device gets unregistered, this involves sending a remove uevent to userspace which invokes powersupplyuevent() to fill the uevent data 4. powersupply_uevent() uses hidpp->battery.desc.properties which now points to freed memory leading to backtraces like this one:

Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08 ... Sep 22 20:01:35 eric kernel: Workqueue: usbhubwq hubevent Sep 22 20:01:35 eric kernel: RIP: 0010:powersupplyuevent+0xee/0x1d0 ... Sep 22 20:01:35 eric kernel: ? asmexcpagefault+0x26/0x30 Sep 22 20:01:35 eric kernel: ? powersupplyuevent+0xee/0x1d0 Sep 22 20:01:35 eric kernel: ? powersupplyuevent+0x10d/0x1d0 Sep 22 20:01:35 eric kernel: devuevent+0x10f/0x2d0 Sep 22 20:01:35 eric kernel: kobjectuevent_env+0x291/0x680 Sep 22 20:01:35 eric kernel:
---truncated---

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52478.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
Fixed
44481b244fcaa2b895a53081d6204c574720c38c
Fixed
cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
Fixed
093af62c023537f097d2ebdfaa0bc7c1a6e874e1
Fixed
28ddc1e0b898291323b62d770b1b931de131a528
Fixed
fd72ac9556a473fc7daf54efb6ca8a97180d621d
Fixed
f7b2c7d9831af99369fe8ad9b2a68d78942f414e
Fixed
dac501397b9d81e4782232c39f94f4307b137452

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.14.328
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.297
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.259
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.199
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.136
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.59
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.8