In the Linux kernel, the following vulnerability has been resolved:
nvme-fc: do not wait in vain when unloading module The module exit path has
race between deleting all controllers and freeing ‘left over IDs’. To
prevent double free a synchronization between nvme_delete_ctrl and
ida_destroy has been added by the initial commit. There is some logic
around trying to prevent from hanging forever in wait_for_completion,
though it does not handling all cases. E.g. blktests is able to reproduce
the situation where the module unload hangs forever. If we completely rely
on the cleanup code executed from the nvme_delete_ctrl path, all IDs will
be freed eventually. This makes calling ida_destroy unnecessary. We only
have to ensure that all nvme_delete_ctrl code has been executed before we
leave nvme_fc_exit_module. This is done by flushing the nvme_delete_wq
workqueue. While at it, remove the unused nvme_fc_wq workqueue too.
Author | Note |
---|---|
Priority reason: Exploitation requires unloading kernel modules, operations the require administrative privilege. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1063.69~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1066.75 | UNKNOWN |
git.kernel.org/linus/70fbfc47a392b98e5f8dba70c6efc6839205c982 (6.8-rc3)
git.kernel.org/stable/c/085195aa90a924c79e35569bcdad860d764a8e17
git.kernel.org/stable/c/0bf567d6d9ffe09e059bbdfb4d07143cef42c75c
git.kernel.org/stable/c/4f2c95015ec2a1899161be6c0bdaecedd5a7bfb2
git.kernel.org/stable/c/70fbfc47a392b98e5f8dba70c6efc6839205c982
git.kernel.org/stable/c/baa6b7eb8c66486bd64608adc63fe03b30d3c0b9
git.kernel.org/stable/c/c0882c366418bf9c19e1ba7f270fe377a9bf5d67
launchpad.net/bugs/cve/CVE-2024-26846
nvd.nist.gov/vuln/detail/CVE-2024-26846
security-tracker.debian.org/tracker/CVE-2024-26846
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
www.cve.org/CVERecord?id=CVE-2024-26846