aoe:修复 aoecmd_cfg_pkts 中潜在的释放后使用问题 (CVE-2024-26898)

CVE编号

CVE-2024-26898

利用情况

暂无

补丁情况

N/A

披露时间

2024-04-17
漏洞描述
In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts

This patch is against CVE-2023-6270. The description of cve is:

A flaw was found in the ATA over Ethernet (AoE) driver in the Linux
kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on
`struct net_device`, and a use-after-free can be triggered by racing
between the free on the struct and the access through the `skbtxq`
global queue. This could lead to a denial of service condition or
potential code execution.

In aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial
code is finished. But the net_device ifp will still be used in
later tx()->dev_queue_xmit() in kthread. Which means that the
dev_put(ifp) should NOT be called in the success path of skb
initial code in aoecmd_cfg_pkts(). Otherwise tx() may run into
use-after-free because the net_device is freed.

This patch removed the dev_put(ifp) in the success path in
aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_12 linux * Up to
(excluding)
6.1.85-1
运行在以下环境
系统 linux linux_kernel * From
(including)
2.6.22
Up to
(excluding)
4.19.311
运行在以下环境
系统 linux linux_kernel * From
(including)
4.20
Up to
(excluding)
5.4.273
运行在以下环境
系统 linux linux_kernel * From
(including)
5.11
Up to
(excluding)
5.15.153
运行在以下环境
系统 linux linux_kernel * From
(including)
5.16
Up to
(excluding)
6.1.83
运行在以下环境
系统 linux linux_kernel * From
(including)
5.5
Up to
(excluding)
5.10.214
运行在以下环境
系统 linux linux_kernel * From
(including)
6.2
Up to
(excluding)
6.6.23
运行在以下环境
系统 linux linux_kernel * From
(including)
6.7
Up to
(excluding)
6.7.11
运行在以下环境
系统 linux linux_kernel * From
(including)
6.8
Up to
(excluding)
6.8.2
CVSS3评分
7.8
  • 攻击路径
    本地
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-416 释放后使用
阿里云安全产品覆盖情况