CVE-2024-38544

medium

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt In rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the resp_pkts queue and then a decision is made whether to run the completer task inline or schedule it. Finally the skb is dereferenced to bump a 'hw' performance counter. This is wrong because if the completer task is already running in a separate thread it may have already processed the skb and freed it which can cause a seg fault. This has been observed infrequently in testing at high scale. This patch fixes this by changing the order of enqueuing the packet until after the counter is accessed.

References

https://git.kernel.org/stable/c/faa8d0ecf6c9c7c2ace3ca3e552180ada6f75e19

https://git.kernel.org/stable/c/bbad88f111a1829f366c189aa48e7e58e57553fc

https://git.kernel.org/stable/c/30df4bef8b8e183333e9b6e9d4509d552c7da6eb

https://git.kernel.org/stable/c/2b23b6097303ed0ba5f4bc036a1c07b6027af5c6

https://git.kernel.org/stable/c/21b4c6d4d89030fd4657a8e7c8110fd941049794

Details

Source: Mitre, NVD

Published: 2024-06-19

Updated: 2024-06-20

Risk Information

CVSS v2

Base Score: 3.8

Vector: CVSS2#AV:L/AC:H/Au:S/C:N/I:N/A:C

Severity: Low

CVSS v3

Base Score: 4.7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium