• CVE-2024-42232

发布时间: 2024年8月23日

修改时间: 2025年4月13日

概要

In the Linux kernel, the following vulnerability has been resolved: libceph: fix race between delayed_work() and ceph_monc_stop() The way the delayed work is handled in ceph_monc_stop() is prone to races with mon_fault() and possibly also finish_hunting(). Both of these can requeue the delayed work which wouldn't be canceled by any of the following code in case that happens after cancel_delayed_work_sync() runs -- __close_session() doesn't mess with the delayed work in order to avoid interfering with the hunting interval logic. This part was missed in commit b5d91704f53e ("libceph: behave in mon_fault() if cur_mon < 0") and use-after-free can still ensue on monc and objects that hang off of it, with monc-&gt;auth and monc-&gt;monmap being particularly susceptible to quickly being reused. To fix this: - clear monc-&gt;cur_mon and monc-&gt;hunting as part of closing the session in ceph_monc_stop() - bail from delayed_work() if monc-&gt;cur_mon is cleared, similar to how it's done in mon_fault() and finish_hunting() (based on monc-&gt;hunting) - call cancel_delayed_work_sync() after the session is closed

CVSS v3 指标

NVD openEuler
CVSS评分 5.5 5.5
Attack Vector Local Local
Attack Complexity Low Low
Privileges Required Low Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality None None
Integrity None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3569 kernel security update 2024年8月23日
KylinSec-SA-2024-4842 kernel security update 2024年8月23日

影响产品

产品 状态
KY3.4-5A kernel Fixed
KY3.5.2 kernel Fixed
V6 kernel Fixed