Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-47695
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-21 Oct, 2024 | 11:53
Updated At-04 May, 2025 | 09:37
Rejected At-
▼CVE Numbering Authority (CNA)
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds

In the Linux kernel, the following vulnerability has been resolved: RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds In the function init_conns(), after the create_con() and create_cm() for loop if something fails. In the cleanup for loop after the destroy tag, we access out of bound memory because cid is set to clt_path->s.con_num. This commits resets the cid to clt_path->s.con_num - 1, to stay in bounds in the cleanup loop later.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/infiniband/ulp/rtrs/rtrs-clt.c
Default Status
unaffected
Versions
Affected
  • From 6a98d71daea186247005099758af549e6afdd244 before 0429a4e972082e3a2351da414b1c017daaf8aed2 (git)
  • From 6a98d71daea186247005099758af549e6afdd244 before 5ac73f8191f3de41fef4f934d84d97f3aadb301f (git)
  • From 6a98d71daea186247005099758af549e6afdd244 before 01b9be936ee8839ab9f83a7e84ee02ac6c8303c4 (git)
  • From 6a98d71daea186247005099758af549e6afdd244 before 1c50e0265fa332c94a4a182e4efa0fc70d8fad94 (git)
  • From 6a98d71daea186247005099758af549e6afdd244 before c8b7f3d9fada0d4b4b7db86bf7345cd61f1d972e (git)
  • From 6a98d71daea186247005099758af549e6afdd244 before 3e4289b29e216a55d08a89e126bc0b37cbad9f38 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/infiniband/ulp/rtrs/rtrs-clt.c
Default Status
affected
Versions
Affected
  • 5.8
Unaffected
  • From 0 before 5.8 (semver)
  • From 5.15.168 through 5.15.* (semver)
  • From 6.1.113 through 6.1.* (semver)
  • From 6.6.54 through 6.6.* (semver)
  • From 6.10.13 through 6.10.* (semver)
  • From 6.11.2 through 6.11.* (semver)
  • From 6.12 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/0429a4e972082e3a2351da414b1c017daaf8aed2
N/A
https://git.kernel.org/stable/c/5ac73f8191f3de41fef4f934d84d97f3aadb301f
N/A
https://git.kernel.org/stable/c/01b9be936ee8839ab9f83a7e84ee02ac6c8303c4
N/A
https://git.kernel.org/stable/c/1c50e0265fa332c94a4a182e4efa0fc70d8fad94
N/A
https://git.kernel.org/stable/c/c8b7f3d9fada0d4b4b7db86bf7345cd61f1d972e
N/A
https://git.kernel.org/stable/c/3e4289b29e216a55d08a89e126bc0b37cbad9f38
N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found