RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES
CVE-2024-53094

5.5MEDIUM

Key Information:

Vendor
Linux
Status
Linux
Vendor
CVE Published:
21 November 2024

Badges

πŸ“° News Worthy

Summary

In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES

While running ISER over SIW, the initiator machine encounters a warning from skb_splice_from_iter() indicating that a slab page is being used in send_page. To address this, it is better to add a sendpage_ok() check within the driver itself, and if it returns 0, then MSG_SPLICE_PAGES flag should be disabled before entering the network stack.

A similar issue has been discussed for NVMe in this thread: https://lore.kernel.org/all/[email protected]/

WARNING: CPU: 0 PID: 5342 at net/core/skbuff.c:7140 skb_splice_from_iter+0x173/0x320 Call Trace: tcp_sendmsg_locked+0x368/0xe40 siw_tx_hdt+0x695/0xa40 [siw] siw_qp_sq_process+0x102/0xb00 [siw] siw_sq_resume+0x39/0x110 [siw] siw_run_sq+0x74/0x160 [siw] kthread+0xd2/0x100 ret_from_fork+0x34/0x40 ret_from_fork_asm+0x1a/0x30

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 3406bfc813a9bbd9c3055795e985f527b7852e8c

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 4e1e3dd88a4cedd5ccc1a3fc3d71e03b70a7a791

News Articles

Multiple Linux Kernel Vulnerabilities In Defer Partition Scanning Patched

The Linux kernel development team has recently addressed two significant vulnerabilities affecting various versions of the Linux operating system.

1 month ago

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“°

    First article discovered by Cyber Security News

  • Vulnerability published

Collectors

NVD DatabaseMitre Database1 News Article(s)
.