Name | CVE-2024-26764 |
Description | In the Linux kernel, the following vulnerability has been resolved: fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio If kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the following kernel warning appears: WARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8 Call trace: kiocb_set_cancel_fn+0x9c/0xa8 ffs_epfile_read_iter+0x144/0x1d0 io_read+0x19c/0x498 io_issue_sqe+0x118/0x27c io_submit_sqes+0x25c/0x5fc __arm64_sys_io_uring_enter+0x104/0xab0 invoke_syscall+0x58/0x11c el0_svc_common+0xb4/0xf4 do_el0_svc+0x2c/0xb0 el0_svc+0x2c/0xa4 el0t_64_sync_handler+0x68/0xb4 el0t_64_sync+0x1a4/0x1a8 Fix this by setting the IOCB_AIO_RW flag for read and write I/O that is submitted by libaio. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3840-1, DLA-3842-1, DSA-5681-1, ELA-1093-1, ELA-1116-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
linux (PTS) | jessie, jessie (lts) | 3.16.84-1 | vulnerable |
stretch (security) | 4.9.320-2 | vulnerable | |
stretch (lts), stretch | 4.9.320-3 | vulnerable | |
buster (security), buster, buster (lts) | 4.19.316-1 | fixed | |
bullseye | 5.10.223-1 | fixed | |
bullseye (security) | 5.10.226-1 | fixed | |
bookworm | 6.1.115-1 | fixed | |
bookworm (security) | 6.1.112-1 | fixed | |
trixie | 6.11.7-1 | fixed | |
sid | 6.11.9-1 | fixed | |
linux-4.19 (PTS) | jessie, jessie (lts) | 4.19.316-1~deb8u1 | fixed |
stretch (security) | 4.19.232-1~deb9u1 | vulnerable | |
stretch (lts), stretch | 4.19.316-1~deb9u1 | fixed | |
linux-5.10 (PTS) | jessie, jessie (lts) | 5.10.226-1~deb8u1 | fixed |
stretch (lts), stretch | 5.10.226-1~deb9u1 | fixed | |
buster, buster (lts) | 5.10.226-1~deb10u1 | fixed | |
buster (security) | 5.10.218-1~deb10u1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
linux | source | jessie | (unfixed) | end-of-life | ||
linux | source | stretch | (unfixed) | end-of-life | ||
linux | source | buster | 4.19.316-1 | DLA-3840-1 | ||
linux | source | bullseye | 5.10.216-1 | DSA-5681-1 | ||
linux | source | bookworm | 6.1.82-1 | |||
linux | source | (unstable) | 6.7.7-1 | |||
linux-4.19 | source | jessie | 4.19.316-1~deb8u1 | ELA-1116-1 | ||
linux-4.19 | source | stretch | 4.19.316-1~deb9u1 | ELA-1116-1 | ||
linux-5.10 | source | jessie | 5.10.216-1~deb8u1 | ELA-1093-1 | ||
linux-5.10 | source | stretch | 5.10.216-1~deb9u1 | ELA-1093-1 | ||
linux-5.10 | source | buster | 5.10.216-1~deb10u1 | DLA-3842-1 |
https://git.kernel.org/linus/b820de741ae48ccf50dd95e297889c286ff4f760 (6.8-rc6)