![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-26743 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
RDMA/qedr: Fix qedr_create_user_qp error flow Avoid the following
warning by making sure to free the allocated resources in case that
qedr_init_user_queue() fail. -----------[ cut here ]-----------
WARNING: CPU: 0 PID: 143192 at drivers/infiniband/core/rdma_core.c:874
uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs] Modules linked in: tls
target_core_user uio target_core_pscsi target_core_file
target_core_iblock ib_srpt ib_srp scsi_transport_srp nfsd nfs_acl
rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache
netfs 8021q garp mrp stp llc ext4 mbcache jbd2 opa_vnic ib_umad
ib_ipoib sunrpc rdma_ucm ib_isert iscsi_target_mod target_core_mod
ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm hfi1
intel_rapl_msr intel_rapl_common mgag200 qedr sb_edac drm_shmem_helper
rdmavt x86_pkg_temp_thermal drm_kms_helper intel_powerclamp ib_uverbs
coretemp i2c_algo_bit kvm_intel dell_wmi_descriptor ipmi_ssif
sparse_keymap kvm ib_core rfkill syscopyarea sysfillrect video
sysimgblt irqbypass ipmi_si ipmi_devintf fb_sys_fops rapl iTCO_wdt
mxm_wmi iTCO_vendor_support intel_cstate pcspkr dcdbas intel_uncore
ipmi_msghandler lpc_ich acpi_power_meter mei_me mei fuse drm xfs
libcrc32c qede sd_mod ahci libahci t10_pi sg crct10dif_pclmul
crc32_pclmul crc32c_intel qed libata tg3 ghash_clmulni_intel
megaraid_sas crc8 wmi [last unloaded: ib_srpt] CPU: 0 PID: 143192
Comm: fi_rdm_tagged_p Kdump: loaded Not tainted 5.14.0-408.el9.x86_64
#1 Hardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 2.14.0
01/25/2022 RIP: 0010:uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
Code: 5d 41 5c 41 5d 41 5e e9 0f 26 1b dd 48 89 df e8 67 6a ff ff 49
8b 86 10 01 00 00 48 85 c0 74 9c 4c 89 e7 e8 83 c0 cb dd eb 92 <0f> 0b
eb be 0f 0b be 04 00 00 00 48 89 df e8 8e f5 ff ff e9 6d ff RSP:
0018:ffffb7c6cadfbc60 EFLAGS: 00010286 RAX: ffff8f0889ee3f60 RBX:
ffff8f088c1a5200 RCX: 00000000802a0016 RDX: 00000000802a0017 RSI:
0000000000000001 RDI: ffff8f0880042600 RBP: 0000000000000001 R08:
0000000000000001 R09: 0000000000000000 R10: ffff8f11fffd5000 R11:
0000000000039000 R12: ffff8f0d5b36cd80 R13: ffff8f088c1a5250 R14:
ffff8f1206d91000 R15: 0000000000000000 FS: 0000000000000000(0000)
GS:ffff8f11d7c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES:
0000 CR0: 0000000080050033 CR2: 0000147069200e20 CR3: 00000001c7210002
CR4: 00000000001706f0 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-26743 https://git.kernel.org/stable/c/135e5465fefa463c5ec93c4eede48b9fedac894a https://git.kernel.org/stable/c/135e5465fefa463c5ec93c4eede48b9fedac894a https://git.kernel.org/stable/c/5639414a52a29336ffa1ede80a67c6d927acbc5a https://git.kernel.org/stable/c/5639414a52a29336ffa1ede80a67c6d927acbc5a https://git.kernel.org/stable/c/5ba4e6d5863c53e937f49932dee0ecb004c65928 https://git.kernel.org/stable/c/5ba4e6d5863c53e937f49932dee0ecb004c65928 https://git.kernel.org/stable/c/7f31a244c753aacf40b71d01f03ca6742f81bbbc https://git.kernel.org/stable/c/7f31a244c753aacf40b71d01f03ca6742f81bbbc https://git.kernel.org/stable/c/95175dda017cd4982cd47960536fa1de003d3298 https://git.kernel.org/stable/c/95175dda017cd4982cd47960536fa1de003d3298 https://git.kernel.org/stable/c/bab8875c06ebda5e01c5c4cab30022aed85c14e6 https://git.kernel.org/stable/c/bab8875c06ebda5e01c5c4cab30022aed85c14e6 |