vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-26689): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Apr 3, 2024 | May 17, 2024 | May 29, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
ceph: prevent use-after-free in encode_cap_msg()
In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was
caught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'. This
implies before the refcount could be increment here, it was freed.
In same file, in "handle_cap_grant()" refcount is decremented by this
line - 'ceph_buffer_put(ci->i_xattrs.blob);'. It appears that a race
occurred and resource was freed by the latter line before the former
line could increment it.
encode_cap_msg() is called by __send_cap() and __send_cap() is called by
ceph_check_caps() after calling __prep_cap(). __prep_cap() is where
arg->xattr_buf is assigned to ci->i_xattrs.blob. This is the spot where
the refcount must be increased to prevent "use after free" error.
Solution(s)
References
- CVE-2024-26689
- https://attackerkb.com/topics/CVE-2024-26689
- UBUNTU-USN-6766-1
- UBUNTU-USN-6766-2
- UBUNTU-USN-6766-3
- UBUNTU-USN-6795-1
- UBUNTU-USN-6828-1
- UBUNTU-USN-6895-1
- UBUNTU-USN-6895-2
- UBUNTU-USN-6895-3
- UBUNTU-USN-6895-4
- UBUNTU-USN-6900-1
- UBUNTU-USN-7495-1
- UBUNTU-USN-7495-2
- UBUNTU-USN-7495-3
- UBUNTU-USN-7496-1
- UBUNTU-USN-7496-2
- UBUNTU-USN-7496-3
- UBUNTU-USN-7496-4
- UBUNTU-USN-7496-5
- UBUNTU-USN-7506-1
- UBUNTU-USN-7506-2
- UBUNTU-USN-7506-3
- UBUNTU-USN-7506-4
- UBUNTU-USN-7517-1
- UBUNTU-USN-7517-2
- UBUNTU-USN-7517-3
- UBUNTU-USN-7518-1
- UBUNTU-USN-7539-1
- UBUNTU-USN-7540-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.