6.3
CVE-2024-38544
- EPSS 0.01%
- Veröffentlicht 19.06.2024 14:15:14
- Zuletzt bearbeitet 21.11.2024 09:26:18
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt In rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the resp_pkts queue and then a decision is made whether to run the completer task inline or schedule it. Finally the skb is dereferenced to bump a 'hw' performance counter. This is wrong because if the completer task is already running in a separate thread it may have already processed the skb and freed it which can cause a seg fault. This has been observed infrequently in testing at high scale. This patch fixes this by changing the order of enqueuing the packet until after the counter is accessed.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
c91fb72a2ca6480d8d77262eef52dc5b178463a3
Version
0b1e5b99a48b5b810e3e38f1d6e0d39306b99ec0
Status
affected
Version <
de5a059e36657442b5637cc16df5163e435b9cb4
Version
0b1e5b99a48b5b810e3e38f1d6e0d39306b99ec0
Status
affected
Version <
e0e14dd35d4242340c7346aac60c7ff8fbf87ffc
Version
0b1e5b99a48b5b810e3e38f1d6e0d39306b99ec0
Status
affected
Version <
faa8d0ecf6c9c7c2ace3ca3e552180ada6f75e19
Version
0b1e5b99a48b5b810e3e38f1d6e0d39306b99ec0
Status
affected
Version <
21b4c6d4d89030fd4657a8e7c8110fd941049794
Version
0b1e5b99a48b5b810e3e38f1d6e0d39306b99ec0
Status
affected
Version <
bbad88f111a1829f366c189aa48e7e58e57553fc
Version
0b1e5b99a48b5b810e3e38f1d6e0d39306b99ec0
Status
affected
Version <
30df4bef8b8e183333e9b6e9d4509d552c7da6eb
Version
0b1e5b99a48b5b810e3e38f1d6e0d39306b99ec0
Status
affected
Version <
2b23b6097303ed0ba5f4bc036a1c07b6027af5c6
Version
0b1e5b99a48b5b810e3e38f1d6e0d39306b99ec0
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.12
Status
affected
Version <
4.12
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.285
Status
unaffected
Version <=
5.10.*
Version
5.10.227
Status
unaffected
Version <=
5.15.*
Version
5.15.168
Status
unaffected
Version <=
6.1.*
Version
6.1.93
Status
unaffected
Version <=
6.6.*
Version
6.6.33
Status
unaffected
Version <=
6.8.*
Version
6.8.12
Status
unaffected
Version <=
6.9.*
Version
6.9.3
Status
unaffected
Version <=
*
Version
6.10
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.007 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.3 | 1 | 5.2 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
|