In the Linux kernel, the following vulnerability has been resolved:
RDMA/hns: Fix UAF for cq async event
The refcount of CQ is not protected by locks. When CQ asynchronous
events and CQ destruction are concurrent, CQ may have been released,
which will cause UAF.
Use the xa_lock() to protect the CQ refcount.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/37a7559dc1358a8d300437e99ed8ecdab0671507 - Patch | |
References | () https://git.kernel.org/stable/c/39d26cf46306bdc7ae809ecfdbfeff5aa1098911 - Patch | |
References | () https://git.kernel.org/stable/c/63da190eeb5c9d849b71f457b15b308c94cbaf08 - Patch | |
References | () https://git.kernel.org/stable/c/763780ef0336a973e933e40e919339381732dcaf - Patch | |
References | () https://git.kernel.org/stable/c/a942ec2745ca864cd8512142100e4027dc306a42 - Patch |
17 Oct 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Aug 2024, 20:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-416 | |
References | () https://git.kernel.org/stable/c/37a7559dc1358a8d300437e99ed8ecdab0671507 - Patch | |
References | () https://git.kernel.org/stable/c/39d26cf46306bdc7ae809ecfdbfeff5aa1098911 - Patch | |
References | () https://git.kernel.org/stable/c/63da190eeb5c9d849b71f457b15b308c94cbaf08 - Patch | |
References | () https://git.kernel.org/stable/c/763780ef0336a973e933e40e919339381732dcaf - Patch | |
References | () https://git.kernel.org/stable/c/a942ec2745ca864cd8512142100e4027dc306a42 - Patch |
20 Jun 2024, 12:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Jun 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-19 14:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38545
Mitre link : CVE-2024-38545
CVE.ORG link : CVE-2024-38545
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free