CVE-2024-26898

HIGH

Linux Kernel < 4.19.311 - Use After Free

Title source: rule

Description

In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts This patch is against CVE-2023-6270. The description of cve is: A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution. In aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial code is finished. But the net_device ifp will still be used in later tx()->dev_queue_xmit() in kthread. Which means that the dev_put(ifp) should NOT be called in the success path of skb initial code in aoecmd_cfg_pkts(). Otherwise tx() may run into use-after-free because the net_device is freed. This patch removed the dev_put(ifp) in the success path in aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 2.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-416
Status published

Affected Products (9)

linux/linux_kernel < 4.19.311
linux/Kernel < 4.19.311linux
linux/Kernel < 5.4.273linux
linux/Kernel < 5.10.214linux
linux/Kernel < 5.15.153linux
linux/Kernel < 6.1.83linux
linux/Kernel < 6.6.23linux
linux/Kernel < 6.7.11linux
linux/Kernel < 6.8.2linux

Timeline

Published Apr 17, 2024
Tracked Since Feb 18, 2026