7.8
CVE-2024-38556
- EPSS 0.03%
- Veröffentlicht 19.06.2024 14:15:15
- Zuletzt bearbeitet 06.03.2025 12:53:37
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Add a timeout to acquire the command queue semaphore Prevent forced completion handling on an entry that has not yet been assigned an index, causing an out of bounds access on idx = -22. Instead of waiting indefinitely for the sem, blocking flow now waits for index to be allocated or a sem acquisition timeout before beginning the timer for FW completion. Kernel log example: mlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 5.4.174 < 5.5
Linux ≫ Linux Kernel Version >= 5.10.94 < 5.11
Linux ≫ Linux Kernel Version >= 5.15.17 < 5.16
Linux ≫ Linux Kernel Version >= 5.16.3 <= 6.1.93
Linux ≫ Linux Kernel Version >= 6.2 <= 6.6.33
Linux ≫ Linux Kernel Version >= 6.7 <= 6.8.12
Linux ≫ Linux Kernel Version >= 6.9 <= 6.9.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.078 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-129 Improper Validation of Array Index
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.