CVE-2024-50062

Source
https://cve.org/CVERecord?id=CVE-2024-50062
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50062.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50062
Downstream
Related
Published
2024-10-21T19:39:51.078Z
Modified
2026-03-11T07:53:06.503567614Z
Summary
RDMA/rtrs-srv: Avoid null pointer deref during path establishment
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/rtrs-srv: Avoid null pointer deref during path establishment

For RTRS path establishment, RTRS client initiates and completes connum of connections. After establishing all its connections, the information is exchanged between the client and server through the inforeq message. During this exchange, it is essential that all connections have been established, and the state of the RTRS srv path is CONNECTED.

So add these sanity checks, to make sure we detect and abort process in error scenarios to avoid null pointer deref.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50062.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9cb837480424e78ed585376f944088246685aec3
Fixed
394b2f4d5e014820455af3eb5859eb328eaafcfd
Fixed
b5d4076664465487a9a3d226756995b12fb73d71
Fixed
ccb8e44ae3e2391235f80ffc6be59bec6b889ead
Fixed
b720792d7e8515bc695752e0ed5884e2ea34d12a
Fixed
d0e62bf7b575fbfe591f6f570e7595dd60a2f5eb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50062.json"