CVE-2024-50001

MEDIUM

Linux kernel - Buffer Overflow

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix error path in multi-packet WQE transmit Remove the erroneous unmap in case no DMA mapping was established The multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. This could fail, e.g. under memory pressure, when the IOMMU driver just can't allocate more memory for page tables. While the code tries to handle this in the path below the err_unmap label it erroneously unmaps one entry from the sq's FIFO list of active mappings. Since the current map attempt failed this unmap is removing some random DMA mapping that might still be required. If the PCI function now presents that IOVA, the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI function in error state. The erroneous behavior was seen in a stress-test environment that created memory pressure.

Scores

CVSS v3 5.5
EPSS 0.0001
EPSS Percentile 0.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-755
Status published
Products (8)
linux/Kernel 5.10.0 - 5.10.227linux
linux/Kernel 5.11.0 - 5.15.168linux
linux/Kernel 5.16.0 - 6.1.113linux
linux/Kernel 6.11.0 - 6.11.3linux
linux/Kernel 6.2.0 - 6.6.55linux
linux/Kernel 6.7.0 - 6.10.14linux
linux/linux_kernel 6.12 rc1
linux/linux_kernel 5.10 - 5.10.227
Published Oct 21, 2024
Tracked Since Feb 18, 2026