CVE-2024-58055
Published: 06 March 2025
Summary
CVE-2024-58055 is a high-severity Double Free (CWE-415) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 2.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely identification, reporting, and correction of flaws such as the double-free in the f_tcm USB gadget driver via kernel patching.
Prohibits or restricts nonessential kernel capabilities like the vulnerable f_tcm USB gadget driver module unless required for operations.
Implements memory protections such as ASLR and guard pages that mitigate exploitation of the double-free vulnerability through memory corruption prevention.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Double-free in Linux kernel USB gadget driver enables local memory corruption leading to privilege escalation (T1068).
NVD Description
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_tcm: Don't free command immediately Don't prematurely free the command. Wait for the status completion of the sense status. It can be freed then. Otherwise we will double-free…
more
the command.
Deeper analysisAI
CVE-2024-58055 is a double-free vulnerability in the Linux kernel's USB gadget f_tcm driver. The issue arises when a command is prematurely freed before the completion of its sense status, leading to a potential double-free of the command structure. This affects the f_tcm (TCM USB gadget function) component, which handles USB gadget emulation for SCSI target functionality. The vulnerability is tracked under CWE-415 (Double Free) and has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
A local attacker with low privileges can exploit this vulnerability due to its low attack complexity and lack of required user interaction. Successful exploitation could result in high-impact confidentiality, integrity, and availability violations, such as memory corruption, kernel crashes, or potential privilege escalation through manipulated memory reuse.
Mitigation involves applying the upstream kernel patches referenced in the stable commit logs, such as those at https://git.kernel.org/stable/c/16907219ad6763f401700e1b57b2da4f3e07f047 and similar commits. These patches ensure the command is not freed until after the sense status completion, preventing the double-free condition. Security practitioners should update affected Linux kernels to incorporate these fixes.
Details
- CWE(s)