In the Linux kernel, the following vulnerability has been resolved:
RDMA/rtrs-srv: Avoid null pointer deref during path establishment
For RTRS path establishment, RTRS client initiates and completes con_num
of connections. After establishing all its connections, the information
is exchanged between the client and server through the info_req message.
During this exchange, it is essential that all connections have been
established, and the state of the RTRS srv path is CONNECTED.
So add these sanity checks, to make sure we detect and abort process in
error scenarios to avoid null pointer deref.
References
Configurations
Configuration 1 (hide)
|
History
23 Oct 2024, 21:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-476 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/394b2f4d5e014820455af3eb5859eb328eaafcfd - Patch | |
References | () https://git.kernel.org/stable/c/b5d4076664465487a9a3d226756995b12fb73d71 - Patch | |
References | () https://git.kernel.org/stable/c/b720792d7e8515bc695752e0ed5884e2ea34d12a - Patch | |
References | () https://git.kernel.org/stable/c/ccb8e44ae3e2391235f80ffc6be59bec6b889ead - Patch | |
References | () https://git.kernel.org/stable/c/d0e62bf7b575fbfe591f6f570e7595dd60a2f5eb - Patch |
23 Oct 2024, 15:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Oct 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-21 20:15
Updated : 2024-10-23 21:48
NVD link : CVE-2024-50062
Mitre link : CVE-2024-50062
CVE.ORG link : CVE-2024-50062
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference