Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-26898
HistoryApr 17, 2024 - 12:00 a.m.

CVE-2024-26898

2024-04-1700:00:00
ubuntu.com
ubuntu.com
12
linux kernel
aoe driver
use-after-free
vulnerability
cve-2024-26898
denial of service

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0

Percentile

9.9%

In the Linux kernel, the following vulnerability has been resolved: aoe:
fix the potential use-after-free problem in aoecmd_cfg_pkts This patch is
against CVE-2023-6270. The description of cve is: A flaw was found in the
ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts()
function improperly updates the refcnt on struct net_device, and a
use-after-free can be triggered by racing between the free on the struct
and the access through the skbtxq global queue. This could lead to a
denial of service condition or potential code execution. In
aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial code is
finished. But the net_device ifp will still be used in later
tx()->dev_queue_xmit() in kthread. Which means that the dev_put(ifp) should
NOT be called in the success path of skb initial code in aoecmd_cfg_pkts().
Otherwise tx() may run into use-after-free because the net_device is freed.
This patch removed the dev_put(ifp) in the success path in
aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().

Notes

Author Note
rodrigo-zaiden duplicate of CVE-2023-6270.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux< 4.15.0-226.238UNKNOWN
ubuntu20.04noarchlinux< 5.4.0-189.209UNKNOWN
ubuntu22.04noarchlinux< 5.15.0-112.122UNKNOWN
ubuntu23.10noarchlinux< 6.5.0-44.44UNKNOWN
ubuntu24.04noarchlinux< 6.8.0-35.35UNKNOWN
ubuntu16.04noarchlinux< 4.4.0-256.290UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1169.182UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1128.138UNKNOWN
ubuntu22.04noarchlinux-aws< 5.15.0-1063.69UNKNOWN
ubuntu24.04noarchlinux-aws< 6.8.0-1009.9UNKNOWN
Rows per page:
1-10 of 861

References

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0

Percentile

9.9%