In the Linux kernel, the following vulnerability has been resolved:

Both cadence-quadspi ->runtime_suspend() and ->runtime_resume()
implementations start with:

struct cqspi_st *cqspi = dev_get_drvdata(dev);
struct spi_controller *host = dev_get_drvdata(dev);

This obviously cannot be correct, unless "struct cqspi_st" is the
first member of " struct spi_controller", or the other way around, but
it is not the case. "struct spi_controller" is allocated by
devm_spi_alloc_host(), which allocates an extra amount of memory for
private data, used to store "struct cqspi_st".

The ->probe() function of the cadence-quadspi driver then sets the
device drvdata to store the address of the "struct cqspi_st"
structure. Therefore:

struct cqspi_st *cqspi = dev_get_drvdata(dev);

is correct, but:

struct spi_controller *host = dev_get_drvdata(dev);

is not, as it makes "host" point not to a "struct spi_controller" but
to the same "struct cqspi_st" structure as above.

This obviously leads to bad things (memory corruption, kernel crashes)
directly during ->probe(), as ->probe() enables the device using PM
runtime, leading the ->runtime_resume() hook being called, which in
turns calls spi_controller_resume() with the wrong pointer.

This has at least been reported [0] to cause a kernel crash, but the
exact behavior will depend on the memory contents.

[0] https://lore.kernel.org/all/20240226121803.5a7r5wkpbbowcxgx@dhruva/

This issue potentially affects all platforms that are currently using
the cadence-quadspi driver.
History

Thu, 22 May 2025 13:00:00 +0000


Thu, 27 Mar 2025 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Weaknesses CWE-787
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.19.283:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10.180:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15.111:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.4.243:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel

Thu, 19 Sep 2024 10:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-822

Wed, 11 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2025-05-22T12:39:31.936Z

Reserved: 2024-02-19T14:20:24.179Z

Link: CVE-2024-26807

cve-icon Vulnrichment

Updated: 2024-08-02T00:14:13.598Z

cve-icon NVD

Status : Modified

Published: 2024-04-04T09:15:09.380

Modified: 2025-05-22T13:15:53.430

Link: CVE-2024-26807

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-04-04T00:00:00Z

Links: CVE-2024-26807 - Bugzilla

cve-icon OpenCVE Enrichment

No data.