CVE-2024-42080

Source
https://cve.org/CVERecord?id=CVE-2024-42080
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42080.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-42080
Downstream
Related
Published
2024-07-29T15:52:42.228Z
Modified
2026-03-14T12:35:15.459038Z
Summary
RDMA/restrack: Fix potential invalid address access
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/restrack: Fix potential invalid address access

struct rdmarestrackentry's kernname was set to KBUILDMODNAME in ibcreatecq(), while if the module exited but forgot del this rdmarestrackentry, it would cause a invalid address access in rdmarestrackclean() when print the owner of this rdmarestrackentry.

These code is used to help find one forgotten PD release in one of the ULPs. But it is not needed anymore, so delete them.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42080.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
03286030ac0420c759fa25f5b976e40293bccaaf
Fixed
8656ef8a9288d6c932654f8d3856dc4ab1cfc6b5
Fixed
782bdaf9d01658281bc813f3f873e6258aa1fd8d
Fixed
8ac281d42337f36cf7061cf1ea094181b84bc1a9
Fixed
f45b43d17240e9ca67ebf3cc82bb046b07cc1c61
Fixed
ca537a34775c103f7b14d7bbd976403f1d1525d8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42080.json"