CVE-2024-42080

In the Linux kernel, the following vulnerability has been resolved: RDMA/restrack: Fix potential invalid address access struct rdma_restrack_entry's kern_name was set to KBUILD_MODNAME in ib_create_cq(), while if the module exited but forgot del this rdma_restrack_entry, it would cause a invalid address access in rdma_restrack_clean() when print the owner of this rdma_restrack_entry. These code is used to help find one forgotten PD release in one of the ULPs. But it is not needed anymore, so delete them.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

30 Jul 2024, 18:57

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/782bdaf9d01658281bc813f3f873e6258aa1fd8d - () https://git.kernel.org/stable/c/782bdaf9d01658281bc813f3f873e6258aa1fd8d - Patch
References () https://git.kernel.org/stable/c/8656ef8a9288d6c932654f8d3856dc4ab1cfc6b5 - () https://git.kernel.org/stable/c/8656ef8a9288d6c932654f8d3856dc4ab1cfc6b5 - Patch
References () https://git.kernel.org/stable/c/8ac281d42337f36cf7061cf1ea094181b84bc1a9 - () https://git.kernel.org/stable/c/8ac281d42337f36cf7061cf1ea094181b84bc1a9 - Patch
References () https://git.kernel.org/stable/c/ca537a34775c103f7b14d7bbd976403f1d1525d8 - () https://git.kernel.org/stable/c/ca537a34775c103f7b14d7bbd976403f1d1525d8 - Patch
References () https://git.kernel.org/stable/c/f45b43d17240e9ca67ebf3cc82bb046b07cc1c61 - () https://git.kernel.org/stable/c/f45b43d17240e9ca67ebf3cc82bb046b07cc1c61 - Patch
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: RDMA/restrack: corrige una posible dirección de acceso no válida. El kern_name de la estructura rdma_restrack_entry se configuró en KBUILD_MODNAME en ib_create_cq(), mientras que si el módulo salía pero olvidaba esta rdma_restrack_entry, causaría una dirección no válida. acceda en rdma_restrack_clean() cuando imprima el propietario de este rdma_restrack_entry. Este código se utiliza para ayudar a encontrar una versión de PD olvidada en uno de los ULP. Pero ya no es necesario, así que elimínelos.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel

29 Jul 2024, 16:21

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 16:15

Updated : 2024-07-30 18:57


NVD link : CVE-2024-42080

Mitre link : CVE-2024-42080

CVE.ORG link : CVE-2024-42080


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write