In the Linux kernel, the following vulnerability has been resolved:
nvme-rdma: destroy cm id before destroy qp to avoid use after free
We should always destroy cm_id before destroy qp to avoid to get cma
event after qp was destroyed, which may lead to use after free.
In RDMA connection establishment error flow, don't destroy qp in cm
event handler.Just report cm_error to upper level, qp will be destroy
in nvme_rdma_alloc_queue() after destroy cm id.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Sep 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat rhel Aus Redhat rhel E4s Redhat rhel Tus |
|
CPEs | cpe:/o:redhat:rhel_aus:8.6 cpe:/o:redhat:rhel_e4s:8.6 cpe:/o:redhat:rhel_tus:8.6 |
|
Vendors & Products |
Redhat
Redhat rhel Aus Redhat rhel E4s Redhat rhel Tus |
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T15:03:41.038Z
Updated: 2024-11-04T12:04:44.581Z
Reserved: 2024-05-21T14:58:30.811Z
Link: CVE-2021-47378
Vulnrichment
Updated: 2024-08-04T05:32:08.590Z
NVD
Status : Awaiting Analysis
Published: 2024-05-21T15:15:23.527
Modified: 2024-11-21T06:36:01.220
Link: CVE-2021-47378
Redhat