CVE-2023-52886

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52886
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52886.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52886
Downstream
Related
Published
2024-07-16T09:40:58.495Z
Modified
2025-11-27T02:32:20.665582Z
Summary
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
Details

In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix race by not overwriting udev->descriptor in hubportinit()

Syzbot reported an out-of-bounds read in sysfs.c:read_descriptors():

BUG: KASAN: slab-out-of-bounds in read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883 Read of size 8 at addr ffff88801e78b8c8 by task udevd/5011

CPU: 0 PID: 5011 Comm: udevd Not tainted 6.4.0-rc6-syzkaller-00195-g40f71e7cd3c6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call Trace: <TASK> _dumpstack lib/dumpstack.c:88 [inline] dumpstacklvl+0xd9/0x150 lib/dumpstack.c:106 printaddressdescription.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351 printreport mm/kasan/report.c:462 [inline] kasanreport+0x11c/0x130 mm/kasan/report.c:572 readdescriptors+0x263/0x280 drivers/usb/core/sysfs.c:883 ... Allocated by task 758: ... _dokmallocnode mm/slabcommon.c:966 [inline] _kmalloc+0x5e/0x190 mm/slabcommon.c:979 kmalloc include/linux/slab.h:563 [inline] kzalloc include/linux/slab.h:680 [inline] usbgetconfiguration+0x1f7/0x5170 drivers/usb/core/config.c:887 usbenumeratedevice drivers/usb/core/hub.c:2407 [inline] usbnew_device+0x12b0/0x19d0 drivers/usb/core/hub.c:2545

As analyzed by Khazhy Kumykov, the cause of this bug is a race between readdescriptors() and hubport_init(): The first routine uses a field in udev->descriptor, not expecting it to change, while the second overwrites it.

Prior to commit 45bf39f8df7f ("USB: core: Don't hold device lock while reading the "descriptors" sysfs file") this race couldn't occur, because the routines were mutually exclusive thanks to the device locking. Removing that locking from read_descriptors() exposed it to the race.

The best way to fix the bug is to keep hubportinit() from changing udev->descriptor once udev has been initialized and registered. Drivers expect the descriptors stored in the kernel to be immutable; we should not undermine this expectation. In fact, this change should have been made long ago.

So now hubportinit() will take an additional argument, specifying a buffer in which to store the device descriptor it reads. (If udev has not yet been initialized, the buffer pointer will be NULL and then hubportinit() will store the device descriptor in udev as before.) This eliminates the data race responsible for the out-of-bounds read.

The changes to hubportinit() appear more extensive than they really are, because of indentation changes resulting from an attempt to avoid writing to other parts of the usb_device structure after it has been initialized. Similar changes should be made to the code that reads the BOS descriptor, but that can be handled in a separate patch later on. This patch is sufficient to fix the bug found by syzbot.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/cc431b3424123d84bcd7afd4de150b33f117a8ef/cves/2023/52xxx/CVE-2023-52886.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
218925bfd5d1436e337c4f961e9c149fbe32de6d
Fixed
9d241c5d9a9b7ad95c90c6520272fe404d5ac88f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
77358093331e9769855140bf94a3f00ecdcf4bb1
Fixed
7fe9d87996062f5eb0ca476ad0257f79bf43aaf5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c87fb861ec185fdc578b4fdc6a05920b6a843840
Fixed
8186596a663506b1124bede9fde6f243ef9f37ee
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
45bf39f8df7f05efb83b302c65ae3b9bc92b7065
Fixed
b4a074b1fb222164ed7d5c0b8c922dc4a0840848
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
45bf39f8df7f05efb83b302c65ae3b9bc92b7065
Fixed
b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
45bf39f8df7f05efb83b302c65ae3b9bc92b7065
Fixed
ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
6badaf880edf51a2da7a439699676394dfdef3e5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
5f35b5d3bd6914c68f743741443dfd3a64b0e455
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
a1e89c8b29d003a20ed2dae6bdae1598d1f23e42
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
1bcb238c54a9c6dc4bded06b06ba7458a5eefa87

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.195
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.132
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.53
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.16
Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.5.3