CVE-2024-26689 — Use After Free in Linux
Severity
7.8HIGHNVD
OSV7.1OSV7.0OSV6.5OSV5.9OSV5.5
EPSS
0.0%
top 98.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3
Latest updateJan 29
Description
In the Linux kernel, the following vulnerability has been resolved:
ceph: prevent use-after-free in encode_cap_msg()
In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was
caught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'. This
implies before the refcount could be increment here, it was freed.
In same file, in "handle_cap_grant()" refcount is decremented by this
line - 'ceph_buffer_put(ci->i_xattrs.blob);'. It appears that a race
occurred and resource was freed by …
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
▶CVEListV5linux/linux9030aaf9bf0a1eee47a154c316c789e959638b0f — 8180d0c27b93a6eb60da1b08ea079e3926328214+6
Also affects: Debian Linux 10.0