U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-38556 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Add a timeout to acquire the command queue semaphore Prevent forced completion handling on an entry that has not yet been assigned an index, causing an out of bounds access on idx = -22. Instead of waiting indefinitely for the sem, blocking flow now waits for index to be allocated or a sem acquisition timeout before beginning the timer for FW completion. Kernel log example: mlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/2d0962d05c93de391ce85f6e764df895f47c8918
https://git.kernel.org/stable/c/2d0962d05c93de391ce85f6e764df895f47c8918
https://git.kernel.org/stable/c/485d65e1357123a697c591a5aeb773994b247ad7
https://git.kernel.org/stable/c/485d65e1357123a697c591a5aeb773994b247ad7
https://git.kernel.org/stable/c/4baae687a20ef2b82fde12de3c04461e6f2521d6
https://git.kernel.org/stable/c/4baae687a20ef2b82fde12de3c04461e6f2521d6
https://git.kernel.org/stable/c/94024332a129c6e4275569d85c0c1bfb2ae2d71b
https://git.kernel.org/stable/c/94024332a129c6e4275569d85c0c1bfb2ae2d71b
https://git.kernel.org/stable/c/f9caccdd42e999b74303c9b0643300073ed5d319
https://git.kernel.org/stable/c/f9caccdd42e999b74303c9b0643300073ed5d319

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-38556
NVD Published Date:
06/19/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org