U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-26898 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts This patch is against CVE-2023-6270. The description of cve is: A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution. In aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial code is finished. But the net_device ifp will still be used in later tx()->dev_queue_xmit() in kthread. Which means that the dev_put(ifp) should NOT be called in the success path of skb initial code in aoecmd_cfg_pkts(). Otherwise tx() may run into use-after-free because the net_device is freed. This patch removed the dev_put(ifp) in the success path in aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/079cba4f4e307c69878226fdf5228c20aa1c969c Patch 
https://git.kernel.org/stable/c/079cba4f4e307c69878226fdf5228c20aa1c969c Patch 
https://git.kernel.org/stable/c/1a54aa506b3b2f31496731039e49778f54eee881 Patch 
https://git.kernel.org/stable/c/1a54aa506b3b2f31496731039e49778f54eee881 Patch 
https://git.kernel.org/stable/c/74ca3ef68d2f449bc848c0a814cefc487bf755fa Patch 
https://git.kernel.org/stable/c/74ca3ef68d2f449bc848c0a814cefc487bf755fa Patch 
https://git.kernel.org/stable/c/7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4 Patch 
https://git.kernel.org/stable/c/7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4 Patch 
https://git.kernel.org/stable/c/a16fbb80064634b254520a46395e36b87ca4731e Patch 
https://git.kernel.org/stable/c/a16fbb80064634b254520a46395e36b87ca4731e Patch 
https://git.kernel.org/stable/c/ad80c34944d7175fa1f5c7a55066020002921a99 Patch 
https://git.kernel.org/stable/c/ad80c34944d7175fa1f5c7a55066020002921a99 Patch 
https://git.kernel.org/stable/c/eb48680b0255a9e8a9bdc93d6a55b11c31262e62 Patch 
https://git.kernel.org/stable/c/eb48680b0255a9e8a9bdc93d6a55b11c31262e62 Patch 
https://git.kernel.org/stable/c/f98364e926626c678fb4b9004b75cacf92ff0662 Patch 
https://git.kernel.org/stable/c/f98364e926626c678fb4b9004b75cacf92ff0662 Patch 
https://git.kernel.org/stable/c/faf0b4c5e00bb680e8e43ac936df24d3f48c8e65 Patch 
https://git.kernel.org/stable/c/faf0b4c5e00bb680e8e43ac936df24d3f48c8e65 Patch 
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source
CWE-416 Use After Free cwe source acceptance level NIST   CISA-ADP  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

9 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-26898
NVD Published Date:
04/17/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org