CVE-2025-39768
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
11/09/2025
Última modificación:
15/09/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5: HWS, fix complex rules rehash error flow<br />
<br />
Moving rules from matcher to matcher should not fail.<br />
However, if it does fail due to various reasons, the error flow<br />
should allow the kernel to continue functioning (albeit with broken<br />
steering rules) instead of going into series of soft lock-ups or<br />
some other problematic behaviour.<br />
<br />
Similar to the simple rules, complex rules rehash logic suffers<br />
from the same problems. This patch fixes the error flow for moving<br />
complex rules:<br />
- If new rule creation fails before it was even enqeued, do not<br />
poll for completion<br />
- If TIMEOUT happened while moving the rule, no point trying<br />
to poll for completions for other rules. Something is broken,<br />
completion won&#39;t come, just abort the rehash sequence.<br />
- If some other completion with error received, don&#39;t give up.<br />
Continue handling rest of the rules to minimize the damage.<br />
- Make sure that the first error code that was received will<br />
be actually returned to the caller instead of replacing it<br />
with the generic error code.<br />
<br />
All the aforementioned issues stem from the same bad error flow,<br />
so no point fixing them one by one and leaving partially broken<br />
code - fixing them in one patch.



