CVE-2025-21929

In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() During the `rmmod` operation for the `intel_ishtp_hid` driver, a use-after-free issue can occur in the hid_ishtp_cl_remove() function. The function hid_ishtp_cl_deinit() is called before ishtp_hid_remove(), which can lead to accessing freed memory or resources during the removal process. Call Trace: ? ishtp_cl_send+0x168/0x220 [intel_ishtp] ? hid_output_report+0xe3/0x150 [hid] hid_ishtp_set_feature+0xb5/0x120 [intel_ishtp_hid] ishtp_hid_request+0x7b/0xb0 [intel_ishtp_hid] hid_hw_request+0x1f/0x40 [hid] sensor_hub_set_feature+0x11f/0x190 [hid_sensor_hub] _hid_sensor_power_state+0x147/0x1e0 [hid_sensor_trigger] hid_sensor_runtime_resume+0x22/0x30 [hid_sensor_trigger] sensor_hub_remove+0xa8/0xe0 [hid_sensor_hub] hid_device_remove+0x49/0xb0 [hid] hid_destroy_device+0x6f/0x90 [hid] ishtp_hid_remove+0x42/0x70 [intel_ishtp_hid] hid_ishtp_cl_remove+0x6b/0xb0 [intel_ishtp_hid] ishtp_cl_device_remove+0x4a/0x60 [intel_ishtp] ... Additionally, ishtp_hid_remove() is a HID level power off, which should occur before the ISHTP level disconnect. This patch resolves the issue by reordering the calls in hid_ishtp_cl_remove(). The function ishtp_hid_remove() is now called before hid_ishtp_cl_deinit().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*

History

10 Apr 2025, 18:07

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: intel-ish-hid: Se solucionó el problema de use-after-free en hid_ishtp_cl_remove(). Durante la operación `rmmod` del controlador `intel_ishtp_hid`, puede producirse un problema de use-after-free en la función hid_ishtp_cl_remove(). La función hid_ishtp_cl_deinit() se llama antes que ishtp_hid_remove(), lo que puede provocar el acceso a memoria o recursos liberados durante el proceso de eliminación. Seguimiento de llamadas: ? ishtp_cl_send+0x168/0x220 [intel_ishtp] ? Informe de salida oculta + 0xe3/0x150 [oculto] Función de configuración de ishtp oculta + 0xb5/0x120 [intel_ishtp_oculto] Solicitud de ishtp oculta + 0x7b/0xb0 [intel_ishtp_oculto] Solicitud de hardware oculta + 0x1f/0x40 [oculto] Función de configuración del concentrador de sensores + 0x11f/0x190 [concentrador de sensores oculta] Estado de alimentación del sensor oculta + 0x147/0x1e0 [activador del sensor oculta] Reanudación del tiempo de ejecución del sensor oculta + 0x22/0x30 [activador del sensor oculta] Eliminación del concentrador de sensores + 0xa8/0xe0 [concentrador de sensores oculta] Eliminación del dispositivo oculta + 0x49/0xb0 [oculto] hid_destroy_device+0x6f/0x90 [hid] ishtp_hid_remove+0x42/0x70 [intel_ishtp_hid] hid_ishtp_cl_remove+0x6b/0xb0 [intel_ishtp_hid] ishtp_cl_device_remove+0x4a/0x60 [intel_ishtp] ... Además, ishtp_hid_remove() es un apagado a nivel HID, que debería ocurrir antes de la desconexión a nivel ISHTP. Este parche resuelve el problema reordenando las llamadas en hid_ishtp_cl_remove(). La función ishtp_hid_remove() ahora se llama antes que hid_ishtp_cl_deinit().
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/823987841424289339fdb4ba90e6d2c3792836db - () https://git.kernel.org/stable/c/823987841424289339fdb4ba90e6d2c3792836db - Patch
References () https://git.kernel.org/stable/c/9c677fe859a73f5dd3dd84c27f99e10d28047c73 - () https://git.kernel.org/stable/c/9c677fe859a73f5dd3dd84c27f99e10d28047c73 - Patch
References () https://git.kernel.org/stable/c/e040f11fbca868c6d151e9f2c5730c476abfcf17 - () https://git.kernel.org/stable/c/e040f11fbca868c6d151e9f2c5730c476abfcf17 - Patch

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2025-04-16 14:15


NVD link : CVE-2025-21929

Mitre link : CVE-2025-21929

CVE.ORG link : CVE-2025-21929


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free