CVE-2024-26872

Updated: 2024-06-05 06:50:31.259299

Description:

In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup Upon rare occasions, KASAN reports a use-after-free Write in srpt_refresh_port(). This seems to be because an event handler is registered before the srpt device is fully setup and a race condition upon error may leave a partially setup event handler in place. Instead, only register the event handler after srpt device initialization is complete.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x MEDIUM 4.4

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 4.4 MEDIUM Released CLSA-2024:1722533082 2024-08-01 14:33:27
AlmaLinux 9.2 FIPS kernel 5.14.0 4.4 MEDIUM Released CLSA-2024:1722530110 2024-08-01 14:33:28
CentOS 6 ELS kernel 2.6.32 4.4 MEDIUM Ignored 2024-06-24 10:10:20
CentOS 7 ELS kernel 3.10.0 4.4 MEDIUM Ignored 2024-06-24 11:20:20
CentOS 8.4 ELS kernel 4.18.0 4.4 MEDIUM Ignored 2024-06-24 11:20:20
CentOS 8.5 ELS kernel 4.18.0 4.4 MEDIUM Ignored 2024-06-24 11:20:21
CentOS Stream 8 ELS kernel 4.18.0 4.4 MEDIUM Already Fixed 2024-06-09 14:18:52
CloudLinux 6 ELS kernel 2.6.32 4.4 MEDIUM Ignored 2024-06-24 10:10:20
Oracle Linux 6 ELS kernel 2.6.32 4.4 MEDIUM Ignored 2024-06-24 10:10:19