U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-26744 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Support specifying the srpt_service_guid parameter Make loading ib_srpt with this parameter set work. The current behavior is that setting that parameter while loading the ib_srpt kernel module triggers the following kernel crash: BUG: kernel NULL pointer dereference, address: 0000000000000000 Call Trace: <TASK> parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 entry_SYSCALL_64_after_hwframe+0x6e/0x76


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82
https://git.kernel.org/stable/c/84f1dac960cfa210a3b7a7522e6c2320ae91932b
https://git.kernel.org/stable/c/989af2f29342a9a7c7515523d879b698ac8465f4
https://git.kernel.org/stable/c/aee4dcfe17219fe60f2821923adea98549060af8
https://git.kernel.org/stable/c/c99a827d3cff9f84e1cb997b7cc6386d107aa74d
https://git.kernel.org/stable/c/fdfa083549de5d50ebf7f6811f33757781e838c0
https://git.kernel.org/stable/c/fe2a73d57319feab4b3b175945671ce43492172f

Weakness Enumeration

CWE-ID CWE Name Source
CWE-476 NULL Pointer Dereference CISA-ADP  

Change History

7 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-26744
NVD Published Date:
04/03/2024
NVD Last Modified:
11/06/2024
Source:
kernel.org