In the Linux kernel, the following vulnerability has been resolved: ceph:
prevent use-after-free in encode_cap_msg() In fs/ceph/caps.c, in
encode_cap_msg(), “use after free” error was caught by KASAN at this line -
‘ceph_buffer_get(arg->xattr_buf);’. This implies before the refcount could
be increment here, it was freed. In same file, in “handle_cap_grant()”
refcount is decremented by this line -
‘ceph_buffer_put(ci->i_xattrs.blob);’. It appears that a race occurred and
resource was freed by the latter line before the former line could
increment it. encode_cap_msg() is called by __send_cap() and __send_cap()
is called by ceph_check_caps() after calling __prep_cap(). __prep_cap() is
where arg->xattr_buf is assigned to ci->i_xattrs.blob. This is the spot
where the refcount must be increased to prevent “use after free” error.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-106.116 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1061.67 | UNKNOWN |
git.kernel.org/linus/cda4672da1c26835dcbd7aec2bfed954eda9b5ef (6.8-rc4)
git.kernel.org/stable/c/70e329b440762390258a6fe8c0de93c9fdd56c77
git.kernel.org/stable/c/7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc
git.kernel.org/stable/c/8180d0c27b93a6eb60da1b08ea079e3926328214
git.kernel.org/stable/c/ae20db45e482303a20e56f2db667a9d9c54ac7e7
git.kernel.org/stable/c/cda4672da1c26835dcbd7aec2bfed954eda9b5ef
git.kernel.org/stable/c/f3f98d7d84b31828004545e29fd7262b9f444139
launchpad.net/bugs/cve/CVE-2024-26689
nvd.nist.gov/vuln/detail/CVE-2024-26689
security-tracker.debian.org/tracker/CVE-2024-26689
ubuntu.com/security/notices/USN-6766-1
ubuntu.com/security/notices/USN-6766-2
ubuntu.com/security/notices/USN-6766-3
ubuntu.com/security/notices/USN-6795-1
ubuntu.com/security/notices/USN-6828-1
www.cve.org/CVERecord?id=CVE-2024-26689