CVE-2024-42232

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
07/08/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> libceph: fix race between delayed_work() and ceph_monc_stop()<br /> <br /> The way the delayed work is handled in ceph_monc_stop() is prone to<br /> races with mon_fault() and possibly also finish_hunting(). Both of<br /> these can requeue the delayed work which wouldn&amp;#39;t be canceled by any of<br /> the following code in case that happens after cancel_delayed_work_sync()<br /> runs -- __close_session() doesn&amp;#39;t mess with the delayed work in order<br /> to avoid interfering with the hunting interval logic. This part was<br /> missed in commit b5d91704f53e ("libceph: behave in mon_fault() if<br /> cur_mon auth and monc-&gt;monmap being<br /> particularly susceptible to quickly being reused.<br /> <br /> To fix this:<br /> <br /> - clear monc-&gt;cur_mon and monc-&gt;hunting as part of closing the session<br /> in ceph_monc_stop()<br /> - bail from delayed_work() if monc-&gt;cur_mon is cleared, similar to how<br /> it&amp;#39;s done in mon_fault() and finish_hunting() (based on monc-&gt;hunting)<br /> - call cancel_delayed_work_sync() after the session is closed

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.318 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.280 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.222 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.163 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.100 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.41 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.10 (excluding)