In the Linux kernel, the following vulnerability has been resolved:
sunrpc: clear XPRTSOCKUPD_TIMEOUT when reset transport
Since transport->sock has been set to NULL during reset transport, XPRTSOCKUPDTIMEOUT also needs to be cleared. Otherwise, the xstcpsetsockettimeouts() may be triggered in xstcpsendrequest() to dereference the transport->sock that has been set to NULL.
[
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c",
"function": "xs_sock_reset_state_flags"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc91d59d34ff6a6fee1c0b48612081a451e05e9a",
"digest": {
"length": 448.0,
"function_hash": "258601859723832638950487532948260767331"
},
"id": "CVE-2024-56688-05b97723"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc91d59d34ff6a6fee1c0b48612081a451e05e9a",
"digest": {
"line_hashes": [
"309746794442807039438172622117919344730",
"174395668746787550906031580951785450150",
"304495145853900742654923378621818337120",
"318457133593918278984296471290416774554"
],
"threshold": 0.9
},
"id": "CVE-2024-56688-168c87c9"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c",
"function": "xs_sock_reset_state_flags"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960",
"digest": {
"length": 448.0,
"function_hash": "258601859723832638950487532948260767331"
},
"id": "CVE-2024-56688-26f7d6b5"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87a95ee34a48dfad198a2002e4966e1d63d53f2b",
"digest": {
"line_hashes": [
"309746794442807039438172622117919344730",
"174395668746787550906031580951785450150",
"304495145853900742654923378621818337120",
"318457133593918278984296471290416774554"
],
"threshold": 0.9
},
"id": "CVE-2024-56688-4a367de1"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e",
"digest": {
"line_hashes": [
"309746794442807039438172622117919344730",
"174395668746787550906031580951785450150",
"304495145853900742654923378621818337120",
"318457133593918278984296471290416774554"
],
"threshold": 0.9
},
"id": "CVE-2024-56688-74d1f00a"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@638a8fa5a7e641f9401346c57e236f02379a0c40",
"digest": {
"line_hashes": [
"309746794442807039438172622117919344730",
"174395668746787550906031580951785450150",
"304495145853900742654923378621818337120",
"318457133593918278984296471290416774554"
],
"threshold": 0.9
},
"id": "CVE-2024-56688-9111dcbf"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960",
"digest": {
"line_hashes": [
"309746794442807039438172622117919344730",
"174395668746787550906031580951785450150",
"304495145853900742654923378621818337120",
"318457133593918278984296471290416774554"
],
"threshold": 0.9
},
"id": "CVE-2024-56688-ac2f50a4"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c",
"function": "xs_sock_reset_state_flags"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e",
"digest": {
"length": 448.0,
"function_hash": "258601859723832638950487532948260767331"
},
"id": "CVE-2024-56688-e8c41aa5"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c",
"function": "xs_sock_reset_state_flags"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@638a8fa5a7e641f9401346c57e236f02379a0c40",
"digest": {
"length": 476.0,
"function_hash": "141079492802437495048167440446478332478"
},
"id": "CVE-2024-56688-f1f8a460"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sunrpc/xprtsock.c",
"function": "xs_sock_reset_state_flags"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87a95ee34a48dfad198a2002e4966e1d63d53f2b",
"digest": {
"length": 448.0,
"function_hash": "258601859723832638950487532948260767331"
},
"id": "CVE-2024-56688-f57430b4"
}
]