RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES
CVE-2024-53094

5.5MEDIUM

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
21 November 2024

Badges

📰 News Worthy

Summary

In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES

While running ISER over SIW, the initiator machine encounters a warning from skb_splice_from_iter() indicating that a slab page is being used in send_page. To address this, it is better to add a sendpage_ok() check within the driver itself, and if it returns 0, then MSG_SPLICE_PAGES flag should be disabled before entering the network stack.

A similar issue has been discussed for NVMe in this thread: https://lore.kernel.org/all/[email protected]/

WARNING: CPU: 0 PID: 5342 at net/core/skbuff.c:7140 skb_splice_from_iter+0x173/0x320 Call Trace: tcp_sendmsg_locked+0x368/0xe40 siw_tx_hdt+0x695/0xa40 [siw] siw_qp_sq_process+0x102/0xb00 [siw] siw_sq_resume+0x39/0x110 [siw] siw_run_sq+0x74/0x160 [siw] kthread+0xd2/0x100 ret_from_fork+0x34/0x40 ret_from_fork_asm+0x1a/0x30

Affected Version(s)

Linux 0e935ae6afcdbe6f0c0aa457ae57feccc63bb9be < 3406bfc813a9bbd9c3055795e985f527b7852e8c

Linux 0e935ae6afcdbe6f0c0aa457ae57feccc63bb9be

Linux 0e935ae6afcdbe6f0c0aa457ae57feccc63bb9be < 4e1e3dd88a4cedd5ccc1a3fc3d71e03b70a7a791

News Articles

Multiple Linux Kernel Vulnerabilities In Defer Partition Scanning Patched

The Linux kernel development team has recently addressed two significant vulnerabilities affecting various versions of the Linux operating system.

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by Cyber Security News

  • Vulnerability published

.