CVE-2024-49982
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
aoe: fix the potential use-after-free problem in more places<br />
<br />
For fixing CVE-2023-6270, f98364e92662 ("aoe: fix the potential<br />
use-after-free problem in aoecmd_cfg_pkts") makes tx() calling dev_put()<br />
instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs<br />
into use-after-free.<br />
<br />
Then Nicolai Stange found more places in aoe have potential use-after-free<br />
problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe()<br />
and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push<br />
packet to tx queue. So they should also use dev_hold() to increase the<br />
refcnt of skb->dev.<br />
<br />
On the other hand, moving dev_put() to tx() causes that the refcnt of<br />
skb->dev be reduced to a negative value, because corresponding<br />
dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(),<br />
probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.214 (including) | 5.10.227 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.153 (including) | 5.15.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.83 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.23 (including) | 6.6.55 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.11 (including) | 6.8.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.10.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:4.19.311:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/07b418d50ccbbca7e5d87a3a0d41d436cefebf79
- https://git.kernel.org/stable/c/12f7b89dd72b25da4eeaa22097877963cad6418e
- https://git.kernel.org/stable/c/6d6e54fc71ad1ab0a87047fd9c211e75d86084a3
- https://git.kernel.org/stable/c/8253a60c89ec35c8f36fb2cc08cdf854c7a3eb58
- https://git.kernel.org/stable/c/89d9a69ae0c667e4d9d028028e2dcc837bae626f
- https://git.kernel.org/stable/c/a786265aecf39015418e4f930cc1c14603a01490
- https://git.kernel.org/stable/c/acc5103a0a8c200a52af7d732c36a8477436a3d3
- https://git.kernel.org/stable/c/bc2cbf7525ac288e07d465f5a1d8cb8fb9599254
- https://git.kernel.org/stable/c/f63461af2c1a86af4217910e47a5c46e3372e645
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



