CVE-2024-38545

In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix UAF for cq async event The refcount of CQ is not protected by locks. When CQ asynchronous events and CQ destruction are concurrent, CQ may have been released, which will cause UAF. Use the xa_lock() to protect the CQ refcount.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/37a7559dc1358a8d300437e99ed8ecdab0671507 - Patch () https://git.kernel.org/stable/c/37a7559dc1358a8d300437e99ed8ecdab0671507 - Patch
References () https://git.kernel.org/stable/c/39d26cf46306bdc7ae809ecfdbfeff5aa1098911 - Patch () https://git.kernel.org/stable/c/39d26cf46306bdc7ae809ecfdbfeff5aa1098911 - Patch
References () https://git.kernel.org/stable/c/63da190eeb5c9d849b71f457b15b308c94cbaf08 - Patch () https://git.kernel.org/stable/c/63da190eeb5c9d849b71f457b15b308c94cbaf08 - Patch
References () https://git.kernel.org/stable/c/763780ef0336a973e933e40e919339381732dcaf - Patch () https://git.kernel.org/stable/c/763780ef0336a973e933e40e919339381732dcaf - Patch
References () https://git.kernel.org/stable/c/a942ec2745ca864cd8512142100e4027dc306a42 - Patch () https://git.kernel.org/stable/c/a942ec2745ca864cd8512142100e4027dc306a42 - Patch

17 Oct 2024, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/330c825e66ef65278e4ebe57fd49c1d6f3f4e34e -

27 Aug 2024, 20:03

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
References () https://git.kernel.org/stable/c/37a7559dc1358a8d300437e99ed8ecdab0671507 - () https://git.kernel.org/stable/c/37a7559dc1358a8d300437e99ed8ecdab0671507 - Patch
References () https://git.kernel.org/stable/c/39d26cf46306bdc7ae809ecfdbfeff5aa1098911 - () https://git.kernel.org/stable/c/39d26cf46306bdc7ae809ecfdbfeff5aa1098911 - Patch
References () https://git.kernel.org/stable/c/63da190eeb5c9d849b71f457b15b308c94cbaf08 - () https://git.kernel.org/stable/c/63da190eeb5c9d849b71f457b15b308c94cbaf08 - Patch
References () https://git.kernel.org/stable/c/763780ef0336a973e933e40e919339381732dcaf - () https://git.kernel.org/stable/c/763780ef0336a973e933e40e919339381732dcaf - Patch
References () https://git.kernel.org/stable/c/a942ec2745ca864cd8512142100e4027dc306a42 - () https://git.kernel.org/stable/c/a942ec2745ca864cd8512142100e4027dc306a42 - Patch

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: RDMA/hns: corrige UAF para el evento cq async El recuento de CQ no está protegido por bloqueos. Cuando los eventos asincrónicos de CQ y la destrucción de CQ son simultáneos, es posible que se haya liberado CQ, lo que provocará UAF. Utilice xa_lock() para proteger el recuento de CQ.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2024-11-21 09:26


NVD link : CVE-2024-38545

Mitre link : CVE-2024-38545

CVE.ORG link : CVE-2024-38545


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free