CVE-2024-26957

In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: fix reference counting on zcrypt card objects Tests with hot-plugging crytpo cards on KVM guests with debug kernel build revealed an use after free for the load field of the struct zcrypt_card. The reason was an incorrect reference handling of the zcrypt card object which could lead to a free of the zcrypt card object while it was still in use. This is an example of the slab message: kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. First byte 0x68 instead of 0x6b kernel: Allocated in zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43 kernel: kmalloc_trace+0x3f2/0x470 kernel: zcrypt_card_alloc+0x36/0x70 [zcrypt] kernel: zcrypt_cex4_card_probe+0x26/0x380 [zcrypt_cex4] kernel: ap_device_probe+0x15c/0x290 kernel: really_probe+0xd2/0x468 kernel: driver_probe_device+0x40/0xf0 kernel: __device_attach_driver+0xc0/0x140 kernel: bus_for_each_drv+0x8c/0xd0 kernel: __device_attach+0x114/0x198 kernel: bus_probe_device+0xb4/0xc8 kernel: device_add+0x4d2/0x6e0 kernel: ap_scan_adapter+0x3d0/0x7c0 kernel: ap_scan_bus+0x5a/0x3b0 kernel: ap_scan_bus_wq_callback+0x40/0x60 kernel: process_one_work+0x26e/0x620 kernel: worker_thread+0x21c/0x440 kernel: Freed in zcrypt_card_put+0x54/0x80 [zcrypt] age=9024 cpu=3 pid=43 kernel: kfree+0x37e/0x418 kernel: zcrypt_card_put+0x54/0x80 [zcrypt] kernel: ap_device_remove+0x4c/0xe0 kernel: device_release_driver_internal+0x1c4/0x270 kernel: bus_remove_device+0x100/0x188 kernel: device_del+0x164/0x3c0 kernel: device_unregister+0x30/0x90 kernel: ap_scan_adapter+0xc8/0x7c0 kernel: ap_scan_bus+0x5a/0x3b0 kernel: ap_scan_bus_wq_callback+0x40/0x60 kernel: process_one_work+0x26e/0x620 kernel: worker_thread+0x21c/0x440 kernel: kthread+0x150/0x168 kernel: __ret_from_fork+0x3c/0x58 kernel: ret_from_fork+0xa/0x30 kernel: Slab 0x00000372022169c0 objects=20 used=18 fp=0x00000000885a7c88 flags=0x3ffff00000000a00(workingset|slab|node=0|zone=1|lastcpupid=0x1ffff) kernel: Object 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88 kernel: Redzone 00000000885a74b0: bb bb bb bb bb bb bb bb ........ kernel: Object 00000000885a74b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk kernel: Object 00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk kernel: Object 00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk kernel: Object 00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk kernel: Object 00000000885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk kernel: Object 00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5 kkkkkkkkkkhKkkk. kernel: Redzone 00000000885a7518: bb bb bb bb bb bb bb bb ........ kernel: Padding 00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZ kernel: CPU: 0 PID: 387 Comm: systemd-udevd Not tainted 6.8.0-HF #2 kernel: Hardware name: IBM 3931 A01 704 (KVM/Linux) kernel: Call Trace: kernel: [<00000000ca5ab5b8>] dump_stack_lvl+0x90/0x120 kernel: [<00000000c99d78bc>] check_bytes_and_report+0x114/0x140 kernel: [<00000000c99d53cc>] check_object+0x334/0x3f8 kernel: [<00000000c99d820c>] alloc_debug_processing+0xc4/0x1f8 kernel: [<00000000c99d852e>] get_partial_node.part.0+0x1ee/0x3e0 kernel: [<00000000c99d94ec>] ___slab_alloc+0xaf4/0x13c8 kernel: [<00000000c99d9e38>] __slab_alloc.constprop.0+0x78/0xb8 kernel: [<00000000c99dc8dc>] __kmalloc+0x434/0x590 kernel: [<00000000c9b4c0ce>] ext4_htree_store_dirent+0x4e/0x1c0 kernel: [<00000000c9b908a2>] htree_dirblock_to_tree+0x17a/0x3f0 kernel: ---truncated---
References
Link Resource
https://git.kernel.org/stable/c/394b6d8bbdf9ddee6d5bcf3e1f3e9f23eecd6484 Patch
https://git.kernel.org/stable/c/50ed48c80fecbe17218afed4f8bed005c802976c Patch
https://git.kernel.org/stable/c/6470078ab3d8f222115e11c4ec67351f3031b3dd Patch
https://git.kernel.org/stable/c/7e500849fa558879a1cde43f80c7c048c2437058 Patch
https://git.kernel.org/stable/c/9daddee03de3f231012014dab8ab2b277a116a55 Patch
https://git.kernel.org/stable/c/a55677878b93e9ebc31f66d0e2fb93be5e7836a6 Patch
https://git.kernel.org/stable/c/a64ab862e84e3e698cd351a87cdb504c7fc575ca Patch
https://git.kernel.org/stable/c/b7f6c3630eb3f103115ab0d7613588064f665d0d Patch
https://git.kernel.org/stable/c/befb7f889594d23e1b475720cf93efd2f77df000 Patch
https://git.kernel.org/stable/c/394b6d8bbdf9ddee6d5bcf3e1f3e9f23eecd6484 Patch
https://git.kernel.org/stable/c/50ed48c80fecbe17218afed4f8bed005c802976c Patch
https://git.kernel.org/stable/c/6470078ab3d8f222115e11c4ec67351f3031b3dd Patch
https://git.kernel.org/stable/c/7e500849fa558879a1cde43f80c7c048c2437058 Patch
https://git.kernel.org/stable/c/9daddee03de3f231012014dab8ab2b277a116a55 Patch
https://git.kernel.org/stable/c/a55677878b93e9ebc31f66d0e2fb93be5e7836a6 Patch
https://git.kernel.org/stable/c/a64ab862e84e3e698cd351a87cdb504c7fc575ca Patch
https://git.kernel.org/stable/c/b7f6c3630eb3f103115ab0d7613588064f665d0d Patch
https://git.kernel.org/stable/c/befb7f889594d23e1b475720cf93efd2f77df000 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

20 Mar 2025, 21:27

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/394b6d8bbdf9ddee6d5bcf3e1f3e9f23eecd6484 - () https://git.kernel.org/stable/c/394b6d8bbdf9ddee6d5bcf3e1f3e9f23eecd6484 - Patch
References () https://git.kernel.org/stable/c/50ed48c80fecbe17218afed4f8bed005c802976c - () https://git.kernel.org/stable/c/50ed48c80fecbe17218afed4f8bed005c802976c - Patch
References () https://git.kernel.org/stable/c/6470078ab3d8f222115e11c4ec67351f3031b3dd - () https://git.kernel.org/stable/c/6470078ab3d8f222115e11c4ec67351f3031b3dd - Patch
References () https://git.kernel.org/stable/c/7e500849fa558879a1cde43f80c7c048c2437058 - () https://git.kernel.org/stable/c/7e500849fa558879a1cde43f80c7c048c2437058 - Patch
References () https://git.kernel.org/stable/c/9daddee03de3f231012014dab8ab2b277a116a55 - () https://git.kernel.org/stable/c/9daddee03de3f231012014dab8ab2b277a116a55 - Patch
References () https://git.kernel.org/stable/c/a55677878b93e9ebc31f66d0e2fb93be5e7836a6 - () https://git.kernel.org/stable/c/a55677878b93e9ebc31f66d0e2fb93be5e7836a6 - Patch
References () https://git.kernel.org/stable/c/a64ab862e84e3e698cd351a87cdb504c7fc575ca - () https://git.kernel.org/stable/c/a64ab862e84e3e698cd351a87cdb504c7fc575ca - Patch
References () https://git.kernel.org/stable/c/b7f6c3630eb3f103115ab0d7613588064f665d0d - () https://git.kernel.org/stable/c/b7f6c3630eb3f103115ab0d7613588064f665d0d - Patch
References () https://git.kernel.org/stable/c/befb7f889594d23e1b475720cf93efd2f77df000 - () https://git.kernel.org/stable/c/befb7f889594d23e1b475720cf93efd2f77df000 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory
First Time Debian
Linux linux Kernel
Debian debian Linux
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/394b6d8bbdf9ddee6d5bcf3e1f3e9f23eecd6484 - () https://git.kernel.org/stable/c/394b6d8bbdf9ddee6d5bcf3e1f3e9f23eecd6484 -
References () https://git.kernel.org/stable/c/50ed48c80fecbe17218afed4f8bed005c802976c - () https://git.kernel.org/stable/c/50ed48c80fecbe17218afed4f8bed005c802976c -
References () https://git.kernel.org/stable/c/6470078ab3d8f222115e11c4ec67351f3031b3dd - () https://git.kernel.org/stable/c/6470078ab3d8f222115e11c4ec67351f3031b3dd -
References () https://git.kernel.org/stable/c/7e500849fa558879a1cde43f80c7c048c2437058 - () https://git.kernel.org/stable/c/7e500849fa558879a1cde43f80c7c048c2437058 -
References () https://git.kernel.org/stable/c/9daddee03de3f231012014dab8ab2b277a116a55 - () https://git.kernel.org/stable/c/9daddee03de3f231012014dab8ab2b277a116a55 -
References () https://git.kernel.org/stable/c/a55677878b93e9ebc31f66d0e2fb93be5e7836a6 - () https://git.kernel.org/stable/c/a55677878b93e9ebc31f66d0e2fb93be5e7836a6 -
References () https://git.kernel.org/stable/c/a64ab862e84e3e698cd351a87cdb504c7fc575ca - () https://git.kernel.org/stable/c/a64ab862e84e3e698cd351a87cdb504c7fc575ca -
References () https://git.kernel.org/stable/c/b7f6c3630eb3f103115ab0d7613588064f665d0d - () https://git.kernel.org/stable/c/b7f6c3630eb3f103115ab0d7613588064f665d0d -
References () https://git.kernel.org/stable/c/befb7f889594d23e1b475720cf93efd2f77df000 - () https://git.kernel.org/stable/c/befb7f889594d23e1b475720cf93efd2f77df000 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

03 Jul 2024, 01:50

Type Values Removed Values Added
CWE CWE-416

25 Jun 2024, 22:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: s390/zcrypt: corrige el recuento de referencias en los objetos de la tarjeta zcrypt. Las pruebas con tarjetas crypto de conexión en caliente en invitados KVM con compilación del kernel de depuración revelaron un use after free el campo de carga de la estructura zcrypt_card . El motivo fue un manejo de referencia incorrecto del objeto de la tarjeta zcrypt que podría provocar la liberación del objeto de la tarjeta zcrypt mientras aún estaba en uso. Este es un ejemplo del mensaje de losa: kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. Primer byte 0x68 en lugar de 0x6b kernel: Asignado en zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43 kernel: kmalloc_trace+0x3f2/0x470 kernel: zcrypt_card_alloc+0x36/0x70 [zcrypt] kernel: zcrypt_cex4_card_probe+0x26/ 0x380 [zcrypt_cex4] kernel: ap_device_probe+0x15c/0x290 kernel: Actually_probe+0xd2/0x468 kernel: driver_probe_device+0x40/0xf0 kernel: __device_attach_driver+0xc0/0x140 kernel: bus_for_each_drv+0x8c/0xd0 kernel: __device_ adjuntar+0x114/0x198 kernel: bus_probe_device+ Kernel 0xb4/0xc8: device_add+0x4d2/0x6e0 kernel: ap_scan_adapter+0x3d0/0x7c0 kernel: ap_scan_bus+0x5a/0x3b0 kernel: ap_scan_bus_wq_callback+0x40/0x60 kernel: Process_one_work+0x26e/0x620 kernel: Kernel x21c/0x440: liberado en zcrypt_card_put +0x54/0x80 [zcrypt] edad=9024 cpu=3 pid=43 kernel: kfree+0x37e/0x418 kernel: zcrypt_card_put+0x54/0x80 [zcrypt] kernel: ap_device_remove+0x4c/0xe0 kernel: device_release_driver_internal+0x1c4/0x270 kernel: bus_remove_device +0x100/0x188 kernel: device_del+0x164/0x3c0 kernel: device_unregister+0x30/0x90 kernel: ap_scan_adapter+0xc8/0x7c0 kernel: ap_scan_bus+0x5a/0x3b0 kernel: ap_scan_bus_wq_callback+0x40/0x60 kernel: Núcleo 26e/0x620: trabajador_thread+ Kernel 0x21c/0x440: kthread+0x150/0x168 kernel: __ret_from_fork+0x3c/0x58 kernel: ret_from_fork+0xa/0x30 kernel: Slab 0x00000372022169c0 objetos=20 usados=18 fp=0x00000000885a7c88 3ffff00000000a00(conjunto de trabajo|losa|nodo=0|zona =1|lastcpupid=0x1ffff) kernel: Objeto 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88 kernel: Redzone 00000000885a74b0: bb bb bb bb bb bb bb bb ........ kernel: Objeto 00000000885a74 b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk kernel: Objeto 00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkk kkkkkkkk kernel: Objeto 00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkk kernel: Objeto 00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkk kernel: Objeto 000000 00885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk kernel : Objeto 00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5 kkkkkkkkkhKkkk. kernel: Redzone 00000000885a7518: bb bb bb bb bb bb bb bb bb ........ kernel: Padding 00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZ kernel: CPU: 0 PID: 387 Comm: systemd -udevd Not tainted 6.8.0-HF #2 kernel: Nombre del hardware: IBM 3931 A01 704 (KVM/Linux) kernel: Call Trace: kernel: [&lt;00000000ca5ab5b8&gt;] dump_stack_lvl+0x90/0x120 kernel: [&lt;00000000c99d78bc&gt;] check_bytes_and_report +0x114/0x140 kernel: [&lt;00000000c99d53cc&gt;] check_object+0x334/0x3f8 kernel: [&lt;00000000c99d820c&gt;] alloc_debug_processing+0xc4/0x1f8 kernel: [&lt;00000000c99d852e&gt;] +0x1ee/0x3e0 núcleo: [&lt;00000000c99d94ec&gt; ] ___slab_alloc+0xaf4/0x13c8 kernel: [&lt;00000000c99d9e38&gt;] __slab_alloc.constprop.0+0x78/0xb8 kernel: [&lt;00000000c99dc8dc&gt;] __kmalloc+0x434/0x590 kernel: [&lt;00000000c9b4c0 ce&gt;] ext4_htree_store_dirent+0x4e/0x1c0 kernel: [&lt; 00000000c9b908a2&gt;] htree_dirblock_to_tree+0x17a/0x3f0 kernel: ---truncado---
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

01 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 06:15

Updated : 2025-03-20 21:27


NVD link : CVE-2024-26957

Mitre link : CVE-2024-26957

CVE.ORG link : CVE-2024-26957


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free