blob: 27c872139661bcd7728e6203582301d1defcc2e2 [file] [log] [blame]
From bippy-5f407fcff5a0 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
net/rds: fix WARNING in rds_conn_connect_if_down
If connection isn't established yet, get_mr() will fail, trigger connection after
get_mr().
The Linux kernel CVE team has assigned CVE-2024-27024 to this issue.
Affected and fixed versions
===========================
Issue introduced in 4.11 with commit 584a8279a44a800dea5a5c1e9d53a002e03016b4 and fixed in 4.19.310 with commit 786854141057751bc08eb26f1b02e97c1631c8f4
Issue introduced in 4.11 with commit 584a8279a44a800dea5a5c1e9d53a002e03016b4 and fixed in 5.4.272 with commit 997efea2bf3a4adb96c306b9ad6a91442237bf5b
Issue introduced in 4.11 with commit 584a8279a44a800dea5a5c1e9d53a002e03016b4 and fixed in 5.10.213 with commit 9dfc15a10dfd44f8ff7f27488651cb5be6af83c2
Issue introduced in 4.11 with commit 584a8279a44a800dea5a5c1e9d53a002e03016b4 and fixed in 5.15.152 with commit b562ebe21ed9adcf42242797dd6cb75beef12bf0
Issue introduced in 4.11 with commit 584a8279a44a800dea5a5c1e9d53a002e03016b4 and fixed in 6.1.82 with commit 998fd719e6d6468b930ac0c44552ea9ff8b07b80
Issue introduced in 4.11 with commit 584a8279a44a800dea5a5c1e9d53a002e03016b4 and fixed in 6.6.22 with commit 2b505d05280739ce31d5708da840f42df827cb85
Issue introduced in 4.11 with commit 584a8279a44a800dea5a5c1e9d53a002e03016b4 and fixed in 6.7.10 with commit 907761307469adecb02461a14120e9a1812a5fb1
Issue introduced in 4.11 with commit 584a8279a44a800dea5a5c1e9d53a002e03016b4 and fixed in 6.8 with commit c055fc00c07be1f0df7375ab0036cebd1106ed38
Issue introduced in 3.18.85 with commit 952835ccd917682ebb705f89ff1e56fbf068a1d8
Issue introduced in 4.1.48 with commit 783941bd9f445a37c2854ec0b4cb9f9e603193a7
Issue introduced in 4.4.103 with commit 57d2ce1603101ce3f30d0ccdc35b98af08d2ed88
Issue introduced in 4.9.66 with commit 5ba1957f889f575f2a240eafe543c3fda5aa72e0
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2024-27024
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
net/rds/rdma.c
net/rds/send.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/786854141057751bc08eb26f1b02e97c1631c8f4
https://git.kernel.org/stable/c/997efea2bf3a4adb96c306b9ad6a91442237bf5b
https://git.kernel.org/stable/c/9dfc15a10dfd44f8ff7f27488651cb5be6af83c2
https://git.kernel.org/stable/c/b562ebe21ed9adcf42242797dd6cb75beef12bf0
https://git.kernel.org/stable/c/998fd719e6d6468b930ac0c44552ea9ff8b07b80
https://git.kernel.org/stable/c/2b505d05280739ce31d5708da840f42df827cb85
https://git.kernel.org/stable/c/907761307469adecb02461a14120e9a1812a5fb1
https://git.kernel.org/stable/c/c055fc00c07be1f0df7375ab0036cebd1106ed38