We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Support specifying the srpt_service_guid parameter Make loading ib_srpt with this parameter set work. The current behavior is that setting that parameter while loading the ib_srpt kernel module triggers the following kernel crash: BUG: kernel NULL pointer dereference, address: 0000000000000000 Call Trace: <TASK> parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 entry_SYSCALL_64_after_hwframe+0x6e/0x76
Reserved 2024-02-19 | Published 2024-04-03 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/84f1dac960cfa210a3b7a7522e6c2320ae91932b
git.kernel.org/...c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82
git.kernel.org/...c/989af2f29342a9a7c7515523d879b698ac8465f4
git.kernel.org/...c/aee4dcfe17219fe60f2821923adea98549060af8
git.kernel.org/...c/fe2a73d57319feab4b3b175945671ce43492172f
git.kernel.org/...c/c99a827d3cff9f84e1cb997b7cc6386d107aa74d
git.kernel.org/...c/fdfa083549de5d50ebf7f6811f33757781e838c0
Support options