CVE-2024-38595

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/06/2024
Last modified:
31/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5: Fix peer devlink set for SF representor devlink port<br /> <br /> The cited patch change register devlink flow, and neglect to reflect<br /> the changes for peer devlink set logic. Peer devlink set is<br /> triggering a call trace if done after devl_register.[1]<br /> <br /> Hence, align peer devlink set logic with register devlink flow.<br /> <br /> [1]<br /> WARNING: CPU: 4 PID: 3394 at net/devlink/core.c:155 devlink_rel_nested_in_add+0x177/0x180<br /> CPU: 4 PID: 3394 Comm: kworker/u40:1 Not tainted 6.9.0-rc4_for_linust_min_debug_2024_04_16_14_08 #1<br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014<br /> Workqueue: mlx5_vhca_event0 mlx5_vhca_state_work_handler [mlx5_core]<br /> RIP: 0010:devlink_rel_nested_in_add+0x177/0x180<br /> Call Trace:<br /> <br /> ? __warn+0x78/0x120<br /> ? devlink_rel_nested_in_add+0x177/0x180<br /> ? report_bug+0x16d/0x180<br /> ? handle_bug+0x3c/0x60<br /> ? exc_invalid_op+0x14/0x70<br /> ? asm_exc_invalid_op+0x16/0x20<br /> ? devlink_port_init+0x30/0x30<br /> ? devlink_port_type_clear+0x50/0x50<br /> ? devlink_rel_nested_in_add+0x177/0x180<br /> ? devlink_rel_nested_in_add+0xdd/0x180<br /> mlx5_sf_mdev_event+0x74/0xb0 [mlx5_core]<br /> notifier_call_chain+0x35/0xb0<br /> blocking_notifier_call_chain+0x3d/0x60<br /> mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]<br /> mlx5_sf_dev_probe+0x185/0x3e0 [mlx5_core]<br /> auxiliary_bus_probe+0x38/0x80<br /> ? driver_sysfs_add+0x51/0x80<br /> really_probe+0xc5/0x3a0<br /> ? driver_probe_device+0x90/0x90<br /> __driver_probe_device+0x80/0x160<br /> driver_probe_device+0x1e/0x90<br /> __device_attach_driver+0x7d/0x100<br /> bus_for_each_drv+0x80/0xd0<br /> __device_attach+0xbc/0x1f0<br /> bus_probe_device+0x86/0xa0<br /> device_add+0x64f/0x860<br /> __auxiliary_device_add+0x3b/0xa0<br /> mlx5_sf_dev_add+0x139/0x330 [mlx5_core]<br /> mlx5_sf_dev_state_change_handler+0x1e4/0x250 [mlx5_core]<br /> notifier_call_chain+0x35/0xb0<br /> blocking_notifier_call_chain+0x3d/0x60<br /> mlx5_vhca_state_work_handler+0x151/0x200 [mlx5_core]<br /> process_one_work+0x13f/0x2e0<br /> worker_thread+0x2bd/0x3c0<br /> ? rescuer_thread+0x410/0x410<br /> kthread+0xc4/0xf0<br /> ? kthread_complete_and_exit+0x20/0x20<br /> ret_from_fork+0x2d/0x50<br /> ? kthread_complete_and_exit+0x20/0x20<br /> ret_from_fork_asm+0x11/0x20<br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.28 (including) 6.7 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8.7 (including) 6.8.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8.8 (including) 6.9 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9.1 (including) 6.9.3 (excluding)
cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*