CVE-2024-26872
HIGHLinux Kernel < 5.10.214 - Use After Free
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup Upon rare occasions, KASAN reports a use-after-free Write in srpt_refresh_port(). This seems to be because an event handler is registered before the srpt device is fully setup and a race condition upon error may leave a partially setup event handler in place. Instead, only register the event handler after srpt device initialization is complete.
References (8)
Scores
CVSS v3
7.0
EPSS
0.0001
EPSS Percentile
1.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-416
Status
published
Affected Products (8)
linux/linux_kernel
< 5.10.214
debian/debian_linux
linux/Kernel
< 5.10.214linux
linux/Kernel
< 5.15.153linux
linux/Kernel
< 6.1.83linux
linux/Kernel
< 6.6.23linux
linux/Kernel
< 6.7.11linux
linux/Kernel
< 6.8.2linux
Timeline
Published
Apr 17, 2024
Tracked Since
Feb 18, 2026