In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup Upon rare occasions, KASAN reports a use-after-free Write in srpt_refresh_port(). This seems to be because an event handler is registered before the srpt device is fully setup and a race condition upon error may leave a partially setup event handler in place. Instead, only register the event handler after srpt device initialization is complete.
| Product | Vendor | Version |
|---|---|---|
| Linux | Linux | RSA Archer GRC Platform prior to 6.2.0.5 |
| Linux | Linux | n/a |
| Linux | Linux | Windows 10 Version 1703 for x64-based Systems |
| Linux | Linux | Windows 10 Version 1803 for 32-bit Systems |