First published: Wed Sep 04 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink When all the strides in a WQE have been consumed, the WQE is unlinked from the WQ linked list (mlx5_wq_ll_pop()). For SHAMPO, it is possible to receive CQEs with 0 consumed strides for the same WQE even after the WQE is fully consumed and unlinked. This triggers an additional unlink for the same wqe which corrupts the linked list. Fix this scenario by accepting 0 sized consumed strides without unlinking the WQE again.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.1.105 | |
Linux Kernel | >=6.2<6.6.46 | |
Linux Kernel | >=6.7<6.10.5 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.119-1 6.12.11-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44970 has a severity rating of high due to potential exploitation risks in the Linux kernel.
To fix CVE-2024-44970, update to the latest Linux kernel versions as outlined in the relevant security advisories.
CVE-2024-44970 affects Linux kernel versions up to 6.1.105, between 6.2 and 6.6.46, and between 6.7 and 6.10.5.
Currently, the best mitigation for CVE-2024-44970 is to apply the available security patches.
CVE-2024-44970 impacts the net/mlx5e component of the Linux kernel related to WQE management.