vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-49982): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | 2024-10-21 | 2024-12-18 | 2025-04-29 |
Description
In the Linux kernel, the following vulnerability has been resolved:
aoe: fix the potential use-after-free problem in more places
For fixing CVE-2023-6270, f98364e92662 ("aoe: fix the potential
use-after-free problem in aoecmd_cfg_pkts") makes tx() calling dev_put()
instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs
into use-after-free.
Then Nicolai Stange found more places in aoe have potential use-after-free
problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe()
and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push
packet to tx queue. So they should also use dev_hold() to increase the
refcnt of skb->dev.
On the other hand, moving dev_put() to tx() causes that the refcnt of
skb->dev be reduced to a negative value, because corresponding
dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(),
probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.
Solution(s)
References
- CVE-2024-49982
- https://attackerkb.com/topics/CVE-2024-49982
- UBUNTU-USN-7166-1
- UBUNTU-USN-7166-2
- UBUNTU-USN-7166-3
- UBUNTU-USN-7166-4
- UBUNTU-USN-7186-1
- UBUNTU-USN-7186-2
- UBUNTU-USN-7194-1
- UBUNTU-USN-7276-1
- UBUNTU-USN-7277-1
- UBUNTU-USN-7293-1
- UBUNTU-USN-7294-1
- UBUNTU-USN-7294-2
- UBUNTU-USN-7294-3
- UBUNTU-USN-7294-4
- UBUNTU-USN-7295-1
- UBUNTU-USN-7301-1
- UBUNTU-USN-7303-1
- UBUNTU-USN-7303-2
- UBUNTU-USN-7303-3
- UBUNTU-USN-7304-1
- UBUNTU-USN-7310-1
- UBUNTU-USN-7311-1
- UBUNTU-USN-7384-1
- UBUNTU-USN-7384-2
- UBUNTU-USN-7385-1
- UBUNTU-USN-7386-1
- UBUNTU-USN-7393-1
- UBUNTU-USN-7401-1
- UBUNTU-USN-7403-1
- UBUNTU-USN-7413-1
- UBUNTU-USN-7468-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.