CVE-2024-42145
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
IB/core: Implement a limit on UMAD receive List<br />
<br />
The existing behavior of ib_umad, which maintains received MAD<br />
packets in an unbounded list, poses a risk of uncontrolled growth.<br />
As user-space applications extract packets from this list, the rate<br />
of extraction may not match the rate of incoming packets, leading<br />
to potential list overflow.<br />
<br />
To address this, we introduce a limit to the size of the list. After<br />
considering typical scenarios, such as OpenSM processing, which can<br />
handle approximately 100k packets per second, and the 1-second retry<br />
timeout for most packets, we set the list size limit to 200k. Packets<br />
received beyond this limit are dropped, assuming they are likely timed<br />
out by the time they are handled by user-space.<br />
<br />
Notably, packets queued on the receive list due to reasons like<br />
timed-out sends are preserved even when the list is full.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.318 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.280 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.222 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.163 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.98 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.9 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1288cf1cceb0e6df276e182f5412370fb4169bcb
- https://git.kernel.org/stable/c/62349fbf86b5e13b02721bdadf98c29afd1e7b5f
- https://git.kernel.org/stable/c/63d202d948bb6d3a28cd8e8b96b160fa53e18baa
- https://git.kernel.org/stable/c/a6627fba793cc75b7365d9504a0095fb2902dda4
- https://git.kernel.org/stable/c/b4913702419d064ec4c4bbf7270643c95cc89a1b
- https://git.kernel.org/stable/c/b8c5f635997f49c625178d1a0cb32a80ed33abe6
- https://git.kernel.org/stable/c/ca0b44e20a6f3032224599f02e7c8fb49525c894
- https://git.kernel.org/stable/c/d73cb8862e4d6760ccc94d3b57b9ef6271400607
- https://git.kernel.org/stable/c/1288cf1cceb0e6df276e182f5412370fb4169bcb
- https://git.kernel.org/stable/c/62349fbf86b5e13b02721bdadf98c29afd1e7b5f
- https://git.kernel.org/stable/c/63d202d948bb6d3a28cd8e8b96b160fa53e18baa
- https://git.kernel.org/stable/c/a6627fba793cc75b7365d9504a0095fb2902dda4
- https://git.kernel.org/stable/c/b4913702419d064ec4c4bbf7270643c95cc89a1b
- https://git.kernel.org/stable/c/b8c5f635997f49c625178d1a0cb32a80ed33abe6
- https://git.kernel.org/stable/c/ca0b44e20a6f3032224599f02e7c8fb49525c894
- https://git.kernel.org/stable/c/d73cb8862e4d6760ccc94d3b57b9ef6271400607
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



