VYPR
Unrated severityNVD Advisory· Published Jul 29, 2018· Updated Aug 5, 2024

CVE-2018-14734

CVE-2018-14734

Description

drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).

Affected products

124

Patches

1
cb2595c1393b

infiniband: fix a possible use-after-free bug

https://github.com/torvalds/linuxCong WangJun 1, 2018via osv
1 file changed · +5 1
  • drivers/infiniband/core/ucma.c+5 1 modified
    @@ -235,7 +235,7 @@ static struct ucma_multicast* ucma_alloc_multicast(struct ucma_context *ctx)
     		return NULL;
     
     	mutex_lock(&mut);
    -	mc->id = idr_alloc(&multicast_idr, mc, 0, 0, GFP_KERNEL);
    +	mc->id = idr_alloc(&multicast_idr, NULL, 0, 0, GFP_KERNEL);
     	mutex_unlock(&mut);
     	if (mc->id < 0)
     		goto error;
    @@ -1421,6 +1421,10 @@ static ssize_t ucma_process_join(struct ucma_file *file,
     		goto err3;
     	}
     
    +	mutex_lock(&mut);
    +	idr_replace(&multicast_idr, mc, mc->id);
    +	mutex_unlock(&mut);
    +
     	mutex_unlock(&file->mut);
     	ucma_put_ctx(ctx);
     	return 0;
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

14

News mentions

0

No linked articles in our index yet.