CVE-2024-26744

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26744
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26744.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26744
Downstream
Related
Published
2024-04-03T17:15:51Z
Modified
2025-08-09T19:01:27Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Support specifying the srptserviceguid parameter

Make loading ibsrpt with this parameter set work. The current behavior is that setting that parameter while loading the ibsrpt kernel module triggers the following kernel crash:

BUG: kernel NULL pointer dereference, address: 0000000000000000 Call Trace: <TASK> parseone+0x18c/0x1d0 parseargs+0xe1/0x230 loadmodule+0x8de/0xa60 initmodulefromfile+0x8b/0xd0 idempotentinitmodule+0x181/0x240 _x64sysfinitmodule+0x5a/0xb0 dosyscall64+0x5f/0xe0 entrySYSCALL64afterhwframe+0x6e/0x76

References

Affected packages