CVE-2024-26689

In the Linux kernel, the following vulnerability has been resolved: ceph: prevent use-after-free in encode_cap_msg() In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was caught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'. This implies before the refcount could be increment here, it was freed. In same file, in "handle_cap_grant()" refcount is decremented by this line - 'ceph_buffer_put(ci->i_xattrs.blob);'. It appears that a race occurred and resource was freed by the latter line before the former line could increment it. encode_cap_msg() is called by __send_cap() and __send_cap() is called by ceph_check_caps() after calling __prep_cap(). __prep_cap() is where arg->xattr_buf is assigned to ci->i_xattrs.blob. This is the spot where the refcount must be increased to prevent "use after free" error.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

14 Jan 2025, 17:26

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
Debian debian Linux
Debian
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/70e329b440762390258a6fe8c0de93c9fdd56c77 - () https://git.kernel.org/stable/c/70e329b440762390258a6fe8c0de93c9fdd56c77 - Patch
References () https://git.kernel.org/stable/c/7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc - () https://git.kernel.org/stable/c/7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc - Patch
References () https://git.kernel.org/stable/c/8180d0c27b93a6eb60da1b08ea079e3926328214 - () https://git.kernel.org/stable/c/8180d0c27b93a6eb60da1b08ea079e3926328214 - Patch
References () https://git.kernel.org/stable/c/ae20db45e482303a20e56f2db667a9d9c54ac7e7 - () https://git.kernel.org/stable/c/ae20db45e482303a20e56f2db667a9d9c54ac7e7 - Patch
References () https://git.kernel.org/stable/c/cda4672da1c26835dcbd7aec2bfed954eda9b5ef - () https://git.kernel.org/stable/c/cda4672da1c26835dcbd7aec2bfed954eda9b5ef - Patch
References () https://git.kernel.org/stable/c/f3f98d7d84b31828004545e29fd7262b9f444139 - () https://git.kernel.org/stable/c/f3f98d7d84b31828004545e29fd7262b9f444139 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Nov 2024, 09:02

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/70e329b440762390258a6fe8c0de93c9fdd56c77 - () https://git.kernel.org/stable/c/70e329b440762390258a6fe8c0de93c9fdd56c77 -
References () https://git.kernel.org/stable/c/7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc - () https://git.kernel.org/stable/c/7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc -
References () https://git.kernel.org/stable/c/8180d0c27b93a6eb60da1b08ea079e3926328214 - () https://git.kernel.org/stable/c/8180d0c27b93a6eb60da1b08ea079e3926328214 -
References () https://git.kernel.org/stable/c/ae20db45e482303a20e56f2db667a9d9c54ac7e7 - () https://git.kernel.org/stable/c/ae20db45e482303a20e56f2db667a9d9c54ac7e7 -
References () https://git.kernel.org/stable/c/cda4672da1c26835dcbd7aec2bfed954eda9b5ef - () https://git.kernel.org/stable/c/cda4672da1c26835dcbd7aec2bfed954eda9b5ef -
References () https://git.kernel.org/stable/c/f3f98d7d84b31828004545e29fd7262b9f444139 - () https://git.kernel.org/stable/c/f3f98d7d84b31828004545e29fd7262b9f444139 -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

03 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 15:15

Updated : 2025-01-14 17:26


NVD link : CVE-2024-26689

Mitre link : CVE-2024-26689

CVE.ORG link : CVE-2024-26689


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free