In the Linux kernel, the following vulnerability has been resolved: ceph: prevent use-after-free in encode_cap_msg() In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was caught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'. This implies before the refcount could be increment here, it was freed. In same file, in "handle_cap_grant()" refcount is decremented by this line - 'ceph_buffer_put(ci->i_xattrs.blob);'. It appears that a race occurred and resource was freed by the latter line before the former line could increment it. encode_cap_msg() is called by __send_cap() and __send_cap() is called by ceph_check_caps() after calling __prep_cap(). __prep_cap() is where arg->xattr_buf is assigned to ci->i_xattrs.blob. This is the spot where the refcount must be increased to prevent "use after free" error.
History

Tue, 05 Nov 2024 10:45:00 +0000

Type Values Removed Values Added
References

Tue, 05 Nov 2024 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-04-03T14:54:50.885Z

Updated: 2024-11-05T09:13:56.461Z

Reserved: 2024-02-19T14:20:24.154Z

Link: CVE-2024-26689

cve-icon Vulnrichment

Updated: 2024-08-02T00:14:12.664Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-03T15:15:52.427

Modified: 2024-11-05T10:15:41.513

Link: CVE-2024-26689

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-04-03T00:00:00Z

Links: CVE-2024-26689 - Bugzilla