CVE-2024-49982

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
21/10/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> aoe: fix the potential use-after-free problem in more places<br /> <br /> For fixing CVE-2023-6270, f98364e92662 ("aoe: fix the potential<br /> use-after-free problem in aoecmd_cfg_pkts") makes tx() calling dev_put()<br /> instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs<br /> into use-after-free.<br /> <br /> Then Nicolai Stange found more places in aoe have potential use-after-free<br /> problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe()<br /> and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push<br /> packet to tx queue. So they should also use dev_hold() to increase the<br /> refcnt of skb-&gt;dev.<br /> <br /> On the other hand, moving dev_put() to tx() causes that the refcnt of<br /> skb-&gt;dev be reduced to a negative value, because corresponding<br /> dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(),<br /> probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.214 (including) 5.10.227 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.153 (including) 5.15.168 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.83 (including) 6.1.113 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.23 (including) 6.6.55 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7.11 (including) 6.8.2 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.10.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.3 (excluding)
cpe:2.3:o:linux:linux_kernel:4.19.311:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*