VYPR
High severity7.8NVD Advisory· Published Apr 17, 2024· Updated May 12, 2026

CVE-2024-26898

CVE-2024-26898

Description

In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts

This patch is against CVE-2023-6270. The description of cve is:

A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on struct net_device, and a use-after-free can be triggered by racing between the free on the struct and the access through the skbtxq global queue. This could lead to a denial of service condition or potential code execution.

In aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial code is finished. But the net_device ifp will still be used in later tx()->dev_queue_xmit() in kthread. Which means that the dev_put(ifp) should NOT be called in the success path of skb initial code in aoecmd_cfg_pkts(). Otherwise tx() may run into use-after-free because the net_device is freed.

This patch removed the dev_put(ifp) in the success path in aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in the Linux kernel's AoE driver could allow local attackers to cause denial of service or potential code execution.

The vulnerability resides in the aoecmd_cfg_pkts() function of the ATA over Ethernet (AoE) driver within the Linux kernel. The function improperly manages reference counts on struct net_device, calling dev_put() prematurely while the device may still be used for packet transmission via the skbtxq global queue. This leads to a use-after-free condition.

To exploit this flaw, an attacker would need local access to the system and the ability to trigger a race condition between freeing the network device and accessing it through the transmit queue. The attack requires low privileges and is limited to systems using the AoE driver.

Successful exploitation could result in a denial of service (system crash) or, potentially, arbitrary code execution in the kernel context, compromising system integrity and confidentiality.

The fix removes the premature dev_put() in the success path of aoecmd_cfg_pkts() and instead places it after the skb is transmitted in the tx() function. This patch has been applied to stable kernel releases to mitigate the vulnerability.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

208

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

13

News mentions

0

No linked articles in our index yet.