CVE-2024-38595
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/06/2024
Last modified:
31/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5: Fix peer devlink set for SF representor devlink port<br />
<br />
The cited patch change register devlink flow, and neglect to reflect<br />
the changes for peer devlink set logic. Peer devlink set is<br />
triggering a call trace if done after devl_register.[1]<br />
<br />
Hence, align peer devlink set logic with register devlink flow.<br />
<br />
[1]<br />
WARNING: CPU: 4 PID: 3394 at net/devlink/core.c:155 devlink_rel_nested_in_add+0x177/0x180<br />
CPU: 4 PID: 3394 Comm: kworker/u40:1 Not tainted 6.9.0-rc4_for_linust_min_debug_2024_04_16_14_08 #1<br />
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014<br />
Workqueue: mlx5_vhca_event0 mlx5_vhca_state_work_handler [mlx5_core]<br />
RIP: 0010:devlink_rel_nested_in_add+0x177/0x180<br />
Call Trace:<br />
<br />
? __warn+0x78/0x120<br />
? devlink_rel_nested_in_add+0x177/0x180<br />
? report_bug+0x16d/0x180<br />
? handle_bug+0x3c/0x60<br />
? exc_invalid_op+0x14/0x70<br />
? asm_exc_invalid_op+0x16/0x20<br />
? devlink_port_init+0x30/0x30<br />
? devlink_port_type_clear+0x50/0x50<br />
? devlink_rel_nested_in_add+0x177/0x180<br />
? devlink_rel_nested_in_add+0xdd/0x180<br />
mlx5_sf_mdev_event+0x74/0xb0 [mlx5_core]<br />
notifier_call_chain+0x35/0xb0<br />
blocking_notifier_call_chain+0x3d/0x60<br />
mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]<br />
mlx5_sf_dev_probe+0x185/0x3e0 [mlx5_core]<br />
auxiliary_bus_probe+0x38/0x80<br />
? driver_sysfs_add+0x51/0x80<br />
really_probe+0xc5/0x3a0<br />
? driver_probe_device+0x90/0x90<br />
__driver_probe_device+0x80/0x160<br />
driver_probe_device+0x1e/0x90<br />
__device_attach_driver+0x7d/0x100<br />
bus_for_each_drv+0x80/0xd0<br />
__device_attach+0xbc/0x1f0<br />
bus_probe_device+0x86/0xa0<br />
device_add+0x64f/0x860<br />
__auxiliary_device_add+0x3b/0xa0<br />
mlx5_sf_dev_add+0x139/0x330 [mlx5_core]<br />
mlx5_sf_dev_state_change_handler+0x1e4/0x250 [mlx5_core]<br />
notifier_call_chain+0x35/0xb0<br />
blocking_notifier_call_chain+0x3d/0x60<br />
mlx5_vhca_state_work_handler+0x151/0x200 [mlx5_core]<br />
process_one_work+0x13f/0x2e0<br />
worker_thread+0x2bd/0x3c0<br />
? rescuer_thread+0x410/0x410<br />
kthread+0xc4/0xf0<br />
? kthread_complete_and_exit+0x20/0x20<br />
ret_from_fork+0x2d/0x50<br />
? kthread_complete_and_exit+0x20/0x20<br />
ret_from_fork_asm+0x11/0x20<br />
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.28 (including) | 6.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8.7 (including) | 6.8.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8.8 (including) | 6.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9.1 (including) | 6.9.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/05d9d7b66836d87c914f8fdd4b062b78e373458d
- https://git.kernel.org/stable/c/3c453e8cc672de1f9c662948dba43176bc68d7f0
- https://git.kernel.org/stable/c/a0501201751034ebe7a22bd9483ed28fea1cd213
- https://git.kernel.org/stable/c/05d9d7b66836d87c914f8fdd4b062b78e373458d
- https://git.kernel.org/stable/c/3c453e8cc672de1f9c662948dba43176bc68d7f0
- https://git.kernel.org/stable/c/a0501201751034ebe7a22bd9483ed28fea1cd213



