CVE-2024-26898

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
17/04/2024
Last modified:
12/05/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts<br /> <br /> This patch is against CVE-2023-6270. The description of cve is:<br /> <br /> A flaw was found in the ATA over Ethernet (AoE) driver in the Linux<br /> kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on<br /> `struct net_device`, and a use-after-free can be triggered by racing<br /> between the free on the struct and the access through the `skbtxq`<br /> global queue. This could lead to a denial of service condition or<br /> potential code execution.<br /> <br /> In aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial<br /> code is finished. But the net_device ifp will still be used in<br /> later tx()-&gt;dev_queue_xmit() in kthread. Which means that the<br /> dev_put(ifp) should NOT be called in the success path of skb<br /> initial code in aoecmd_cfg_pkts(). Otherwise tx() may run into<br /> use-after-free because the net_device is freed.<br /> <br /> This patch removed the dev_put(ifp) in the success path in<br /> aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.22 (including) 4.19.311 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.273 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.214 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.153 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.83 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.23 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.8.2 (excluding)


References to Advisories, Solutions, and Tools