libceph:修复 delayed_work() 和 ceph_monc_stop() 之间的竞争(CVE-2024-42232)

admin 2024-08-10 12:28:00 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
libceph:修复 delayed_work() 和 ceph_monc_stop() 之间的竞争(CVE-2024-42232)

CVE编号

CVE-2024-42232

利用情况

暂无

补丁情况

N/A

披露时间

2024-08-08
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: libceph: fix race between delayed_work() and ceph_monc_stop() The way the delayed work is handled in ceph_monc_stop() is prone to races with mon_fault() and possibly also finish_hunting(). Both of these can requeue the delayed work which wouldn't be canceled by any of the following code in case that happens after cancel_delayed_work_sync() runs -- __close_session() doesn't mess with the delayed work in order to avoid interfering with the hunting interval logic. This part was missed in commit b5d91704f53e ("libceph: behave in mon_fault() if cur_mon < 0") and use-after-free can still ensue on monc and objects that hang off of it, with monc->auth and monc->monmap being particularly susceptible to quickly being reused. To fix this: - clear monc->cur_mon and monc->hunting as part of closing the session in ceph_monc_stop() - bail from delayed_work() if monc->cur_mon is cleared, similar to how it's done in mon_fault() and finish_hunting() (based on monc->hunting) - call cancel_delayed_work_sync() after the session is closed
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/1177afeca833174ba83504688eec898c6214f4bf
https://git.kernel.org/stable/c/20cf67dcb7db842f941eff1af6ee5e9dc41796d7
https://git.kernel.org/stable/c/2d33654d40a05afd91ab24c9a73ab512a0670a9a
https://git.kernel.org/stable/c/33d38c5da17f8db2d80e811b7829d2822c10625e
https://git.kernel.org/stable/c/34b76d1922e41da1fa73d43b764cddd82ac9733c
https://git.kernel.org/stable/c/63e5d035e3a7ab7412a008f202633c5e6a0a28ea
https://git.kernel.org/stable/c/69c7b2fe4c9cc1d3b1186d1c5606627ecf0de883
https://git.kernel.org/stable/c/9525af1f58f67df387768770fcf6d6a8f23aee3d
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 linux linux_kernel * Up to (excluding) 4.19.318
运行在以下环境
系统 linux linux_kernel * From (including) 4.20 Up to (excluding) 5.4.280
运行在以下环境
系统 linux linux_kernel * From (including) 5.11 Up to (excluding) 5.15.163
运行在以下环境
系统 linux linux_kernel * From (including) 5.16 Up to (excluding) 6.1.100
运行在以下环境
系统 linux linux_kernel * From (including) 5.5 Up to (excluding) 5.10.222
运行在以下环境
系统 linux linux_kernel * From (including) 6.2 Up to (excluding) 6.6.41
运行在以下环境
系统 linux linux_kernel * From (including) 6.7 Up to (excluding) 6.9.10
CVSS3评分 5.5
  • 攻击路径 本地
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 无
  • 完整性 无
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-ID 漏洞类型
CWE-416 释放后使用
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0