Updated: 2025-12-14 01:07:09.456964
Description:
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup Upon rare occasions, KASAN reports a use-after-free Write in srpt_refresh_port(). This seems to be because an event handler is registered before the srpt device is fully setup and a race condition upon error may leave a partially setup event handler in place. Instead, only register the event handler after srpt device initialization is complete.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.0 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| RHEL 7 ELS | kernel | 3.10.0 | 7.0 | HIGH | Released | CLSA-2025:1750353839 | 2025-06-20 00:31:27 | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.0 | HIGH | Released | CLSA-2025:1744624441 | 2025-04-15 04:04:51 | |
| Ubuntu 16.04 ELS | linux | 4.4.0 | 7.0 | HIGH | Released | CLSA-2025:1744713316 | 2025-04-16 04:36:12 | |
| Ubuntu 18.04 ELS | linux | 4.15.0 | 7.0 | HIGH | Released | CLSA-2025:1744213128 | 2025-04-10 03:17:08 |