CVE-2024-26744

Source
https://cve.org/CVERecord?id=CVE-2024-26744
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26744.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26744
Downstream
Related
Published
2024-04-03T17:00:33.280Z
Modified
2026-03-13T07:51:58.035973Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
RDMA/srpt: Support specifying the srpt_service_guid parameter
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Support specifying the srptserviceguid parameter

Make loading ibsrpt with this parameter set work. The current behavior is that setting that parameter while loading the ibsrpt kernel module triggers the following kernel crash:

BUG: kernel NULL pointer dereference, address: 0000000000000000 Call Trace: <TASK> parseone+0x18c/0x1d0 parseargs+0xe1/0x230 loadmodule+0x8de/0xa60 initmodulefromfile+0x8b/0xd0 idempotentinitmodule+0x181/0x240 _x64sysfinitmodule+0x5a/0xb0 dosyscall64+0x5f/0xe0 entrySYSCALL64afterhwframe+0x6e/0x76

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26744.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a42d985bd5b234da8b61347a78dc3057bf7bb94d
Fixed
84f1dac960cfa210a3b7a7522e6c2320ae91932b
Fixed
e0055d6461b36bfc25a9d2ab974eef78d36a6738
Fixed
5a5c039dac1b1b7ba3e91c791f4421052bf79b82
Fixed
989af2f29342a9a7c7515523d879b698ac8465f4
Fixed
aee4dcfe17219fe60f2821923adea98549060af8
Fixed
fe2a73d57319feab4b3b175945671ce43492172f
Fixed
c99a827d3cff9f84e1cb997b7cc6386d107aa74d
Fixed
fdfa083549de5d50ebf7f6811f33757781e838c0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26744.json"