Bug 2221700 (CVE-2023-4134) - CVE-2023-4134 kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work()
Summary: CVE-2023-4134 kernel: cyttsp4_core: use-after-free in cyttsp4_watchdog_work()
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2023-4134
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2221708 2221710 2228792
Blocks: 2221670
TreeView+ depends on / blocked
 
Reported: 2023-07-10 15:29 UTC by Mauro Matteo Cascella
Modified: 2023-08-07 22:11 UTC (History)
46 users (show)

Fixed In Version: kernel 6.5-rc1
Doc Type: If docs needed, set a value
Doc Text:
A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.
Clone Of:
Environment:
Last Closed: 2023-08-03 15:01:50 UTC
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2023-07-10 15:29:43 UTC
From the upstream fix below: The watchdog_timer can schedule tx_timeout_task and watchdog_work can also arm watchdog_timer [..] Although del_timer_sync() and cancel_work_sync() are called in cyttsp4_remove(), the timer and workqueue could still be rearmed. As a result, the possible use after free bugs could happen.

Upstream commit:
https://github.com/torvalds/linux/commit/dbe836576f12743a7d2d170ad4ad4fd324c4d47a

Comment 2 Mauro Matteo Cascella 2023-08-03 09:49:56 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2228792]

Comment 3 Product Security DevOps Team 2023-08-03 15:01:46 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-4134

Comment 4 Justin M. Forbes 2023-08-07 22:11:44 UTC
This was fixed for Fedora with the 6.4.4 stable kernel updates.


Note You need to log in before you can comment on or make changes to this bug.