CVE-2024-38544

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
19/06/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt<br /> <br /> In rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the<br /> resp_pkts queue and then a decision is made whether to run the completer<br /> task inline or schedule it. Finally the skb is dereferenced to bump a &amp;#39;hw&amp;#39;<br /> performance counter. This is wrong because if the completer task is<br /> already running in a separate thread it may have already processed the skb<br /> and freed it which can cause a seg fault. This has been observed<br /> infrequently in testing at high scale.<br /> <br /> This patch fixes this by changing the order of enqueuing the packet until<br /> after the counter is accessed.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.12 (including) 5.4.285 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.227 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.168 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.93 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.3 (excluding)