In the Linux kernel, the following vulnerability has been resolved:
nvme-rdma: destroy cm id before destroy qp to avoid use after free
We should always destroy cm_id before destroy qp to avoid to get cma
event after qp was destroyed, which may lead to use after free.
In RDMA connection establishment error flow, don't destroy qp in cm
event handler.Just report cm_error to upper level, qp will be destroy
in nvme_rdma_alloc_queue() after destroy cm id.
References
Configurations
Configuration 1 (hide)
|
History
02 Apr 2025, 14:52
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/9817d763dbe15327b9b3ff4404fa6f27f927e744 - Patch | |
References | () https://git.kernel.org/stable/c/d268a182c56e8361e19fb781137411643312b994 - Patch | |
References | () https://git.kernel.org/stable/c/ecf0dc5a904830c926a64feffd8e01141f89822f - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* |
Information
Published : 2024-05-21 15:15
Updated : 2025-04-02 14:52
NVD link : CVE-2021-47378
Mitre link : CVE-2021-47378
CVE.ORG link : CVE-2021-47378
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free