First published: Wed Apr 19 2023(Updated: )
The improper cleanup of resolve_prepare_src leads to a key mismatch or duplicate key in the cma id tree, which results in out-of-boundary in compare_netdev_and_ip. The issue was found in drivers/infiniband/core/cma.c in Linux in 6.1. A local user can utilize this bug to crash the system or escalation of privilege. Affected component: rdma driver References: <a href="https://lkml.org/lkml/2022/12/9/178">https://lkml.org/lkml/2022/12/9/178</a> <a href="https://www.spinics.net/lists/linux-rdma/msg114749.html">https://www.spinics.net/lists/linux-rdma/msg114749.html</a> <a href="https://patchwork.kernel.org/project/linux-rdma/patch/3d0e9a2fd62bc10ba02fed1c7c48a48638952320.1672819273.git.leonro@nvidia.com/">https://patchwork.kernel.org/project/linux-rdma/patch/3d0e9a2fd62bc10ba02fed1c7c48a48638952320.1672819273.git.leonro@nvidia.com/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
Linux RDMA Driver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2187931 is critical as it allows local users to crash the system or escalate privileges.
To fix REDHAT-BUG-2187931, apply the latest Linux kernel patches that address the cma id tree issue.
REDHAT-BUG-2187931 affects the Linux kernel and the Linux RDMA driver.
No, REDHAT-BUG-2187931 requires local access to exploit the vulnerability.
The root cause of REDHAT-BUG-2187931 is improper cleanup in the resolve_prepare_src function leading to key mismatches.