CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix UAF for cq async event The refcount of CQ is not protected by locks. When CQ asynchronous events and CQ destruction are concurrent, CQ may have been released, which will cause UAF. Use the xa_lock() to protect the CQ refcount.
git.kernel.org/linus/a942ec2745ca864cd8512142100e4027dc306a42
git.kernel.org/stable/c/37a7559dc1358a8d300437e99ed8ecdab0671507
git.kernel.org/stable/c/39d26cf46306bdc7ae809ecfdbfeff5aa1098911
git.kernel.org/stable/c/63da190eeb5c9d849b71f457b15b308c94cbaf08
git.kernel.org/stable/c/763780ef0336a973e933e40e919339381732dcaf
git.kernel.org/stable/c/a942ec2745ca864cd8512142100e4027dc306a42
ubuntu.com/security/CVE-2024-38545
ubuntu.com/security/notices/USN-6949-1
ubuntu.com/security/notices/USN-6949-2
ubuntu.com/security/notices/USN-6952-1
ubuntu.com/security/notices/USN-6952-2
ubuntu.com/security/notices/USN-6955-1
www.cve.org/CVERecord?id=CVE-2024-38545