CVE-2024-26929
QLA2XXX FCPort Double Free Vulnerability
Description
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
INFO
Published Date :
May 1, 2024, 6:15 a.m.
Last Modified :
Jan. 6, 2025, 5:15 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Update the affected packages.
- Update the affected kernel package.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-26929 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-26929 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Rejected by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jan. 06, 2025
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jan. 06, 2025
Action Type Old Value New Value Changed Description In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix double free of fcport The server was crashing after LOGO because fcport was getting freed twice. -----------[ cut here ]----------- kernel BUG at mm/slub.c:371! invalid opcode: 0000 1 SMP PTI CPU: 35 PID: 4610 Comm: bash Kdump: loaded Tainted: G OE --------- - - 4.18.0-425.3.1.el8.x86_64 #1 Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021 RIP: 0010:set_freepointer.part.57+0x0/0x10 RSP: 0018:ffffb07107027d90 EFLAGS: 00010246 RAX: ffff9cb7e3150000 RBX: ffff9cb7e332b9c0 RCX: ffff9cb7e3150400 RDX: 0000000000001f37 RSI: 0000000000000000 RDI: ffff9cb7c0005500 RBP: fffff693448c5400 R08: 0000000080000000 R09: 0000000000000009 R10: 0000000000000000 R11: 0000000000132af0 R12: ffff9cb7c0005500 R13: ffff9cb7e3150000 R14: ffffffffc06990e0 R15: ffff9cb7ea85ea58 FS: 00007ff6b79c2740(0000) GS:ffff9cb8f7ec0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b426b7d700 CR3: 0000000169c18002 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: kfree+0x238/0x250 qla2x00_els_dcmd_sp_free+0x20/0x230 [qla2xxx] ? qla24xx_els_dcmd_iocb+0x607/0x690 [qla2xxx] qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx] ? qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx] ? kernfs_fop_write+0x11e/0x1a0 Remove one of the free calls and add check for valid fcport. Also use function qla2x00_free_fcport() instead of kfree(). Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Removed CVSS V3.1 NIST: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Removed CVSS V3.1 CISA-ADP: AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Removed CWE NIST: CWE-415 Removed CWE CISA-ADP: CWE-415 Removed CPE Configuration 3173406 Config Identifier: 1, OR *cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 from (excluding) 6.6.24 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 from (excluding) 6.7.12 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 from (excluding) 6.1.84 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (excluding) 6.8 from (excluding) 6.8.3 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (excluding) 5.15.154 Removed Reference kernel.org: https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e Removed Reference kernel.org: https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525 Removed Reference kernel.org: https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774 Removed Reference kernel.org: https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b Removed Reference kernel.org: https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04 Removed Reference kernel.org: https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862 Removed Reference CVE: https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e Removed Reference CVE: https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525 Removed Reference CVE: https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774 Removed Reference CVE: https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b Removed Reference CVE: https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04 Removed Reference CVE: https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862 Removed Reference Type kernel.org: https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e Types: Patch Removed Reference Type kernel.org: https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525 Types: Patch Removed Reference Type kernel.org: https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774 Types: Patch Removed Reference Type kernel.org: https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b Types: Patch Removed Reference Type kernel.org: https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04 Types: Patch Removed Reference Type kernel.org: https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862 Types: Patch Removed Reference Type CVE: https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e Types: Patch Removed Reference Type CVE: https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525 Types: Patch Removed Reference Type CVE: https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774 Types: Patch Removed Reference Type CVE: https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b Types: Patch Removed Reference Type CVE: https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04 Types: Patch Removed Reference Type CVE: https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862 Types: Patch -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e Added Reference https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525 Added Reference https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774 Added Reference https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b Added Reference https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04 Added Reference https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Aug. 08, 2024
Action Type Old Value New Value Added CWE CISA-ADP CWE-415 Added CVSS V3.1 CISA-ADP AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 29, 2024
Action Type Old Value New Value -
Initial Analysis by [email protected]
May. 23, 2024
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Changed Reference Type https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e No Types Assigned https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e Patch Changed Reference Type https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525 No Types Assigned https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525 Patch Changed Reference Type https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774 No Types Assigned https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774 Patch Changed Reference Type https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b No Types Assigned https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b Patch Changed Reference Type https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04 No Types Assigned https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04 Patch Changed Reference Type https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862 No Types Assigned https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862 Patch Added CWE NIST CWE-415 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 5.15.154 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.84 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.24 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.7.12 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (excluding) 6.8 up to (excluding) 6.8.3 *cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 14, 2024
Action Type Old Value New Value -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 01, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix double free of fcport The server was crashing after LOGO because fcport was getting freed twice. -----------[ cut here ]----------- kernel BUG at mm/slub.c:371! invalid opcode: 0000 1 SMP PTI CPU: 35 PID: 4610 Comm: bash Kdump: loaded Tainted: G OE --------- - - 4.18.0-425.3.1.el8.x86_64 #1 Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021 RIP: 0010:set_freepointer.part.57+0x0/0x10 RSP: 0018:ffffb07107027d90 EFLAGS: 00010246 RAX: ffff9cb7e3150000 RBX: ffff9cb7e332b9c0 RCX: ffff9cb7e3150400 RDX: 0000000000001f37 RSI: 0000000000000000 RDI: ffff9cb7c0005500 RBP: fffff693448c5400 R08: 0000000080000000 R09: 0000000000000009 R10: 0000000000000000 R11: 0000000000132af0 R12: ffff9cb7c0005500 R13: ffff9cb7e3150000 R14: ffffffffc06990e0 R15: ffff9cb7ea85ea58 FS: 00007ff6b79c2740(0000) GS:ffff9cb8f7ec0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b426b7d700 CR3: 0000000169c18002 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: kfree+0x238/0x250 qla2x00_els_dcmd_sp_free+0x20/0x230 [qla2xxx] ? qla24xx_els_dcmd_iocb+0x607/0x690 [qla2xxx] qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx] ? qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx] ? kernfs_fop_write+0x11e/0x1a0 Remove one of the free calls and add check for valid fcport. Also use function qla2x00_free_fcport() instead of kfree(). Added Reference kernel.org https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525 [No types assigned]