CVE-2024-27024

Severity

78%

Complexity

18%

Confidentiality

98%

In the Linux kernel, the following vulnerability has been resolved: net/rds: fix WARNING in rds_conn_connect_if_down If connection isn't established yet, get_mr() will fail, trigger connection after get_mr().

CVSS 3.1 Base Score 7.8. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Overview

First reported 9 months ago

2024-05-01 13:15:00

Last updated 1 month ago

2024-12-23 19:22:00

Affected Software

Linux Kernel

References

https://git.kernel.org/stable/c/786854141057751bc08eb26f1b02e97c1631c8f4

https://git.kernel.org/stable/c/997efea2bf3a4adb96c306b9ad6a91442237bf5b

https://git.kernel.org/stable/c/9dfc15a10dfd44f8ff7f27488651cb5be6af83c2

https://git.kernel.org/stable/c/b562ebe21ed9adcf42242797dd6cb75beef12bf0

https://git.kernel.org/stable/c/998fd719e6d6468b930ac0c44552ea9ff8b07b80

https://git.kernel.org/stable/c/2b505d05280739ce31d5708da840f42df827cb85

https://git.kernel.org/stable/c/907761307469adecb02461a14120e9a1812a5fb1

https://git.kernel.org/stable/c/c055fc00c07be1f0df7375ab0036cebd1106ed38

https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

https://git.kernel.org/stable/c/2b505d05280739ce31d5708da840f42df827cb85

Patch

https://git.kernel.org/stable/c/786854141057751bc08eb26f1b02e97c1631c8f4

Patch

https://git.kernel.org/stable/c/907761307469adecb02461a14120e9a1812a5fb1

Patch

https://git.kernel.org/stable/c/997efea2bf3a4adb96c306b9ad6a91442237bf5b

Patch

https://git.kernel.org/stable/c/998fd719e6d6468b930ac0c44552ea9ff8b07b80

Patch

https://git.kernel.org/stable/c/9dfc15a10dfd44f8ff7f27488651cb5be6af83c2

Patch

https://git.kernel.org/stable/c/b562ebe21ed9adcf42242797dd6cb75beef12bf0

Patch

https://git.kernel.org/stable/c/c055fc00c07be1f0df7375ab0036cebd1106ed38

Patch

https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

Mailing List, Third Party Advisory

https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Mailing List, Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.