First published: Thu Nov 07 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop Driver waits indefinitely for the fifo occupancy to go below a threshold as soon as the pacing interrupt is received. This can cause soft lockup on one of the processors, if the rate of DB is very high. Add a loop count for FPGA and exit the __wait_for_fifo_occupancy_below_th if the loop is taking more time. Pacing will be continuing until the occupancy is below the threshold. This is ensured by the checks in bnxt_re_pacing_timer_exp and further scheduling the work for pacing based on the fifo occupancy.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.6<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50157 is considered a medium severity vulnerability due to the risk of causing soft lockups in systems using affected kernel versions.
To mitigate CVE-2024-50157, users should update their Linux kernel to version 6.12-rc4 or later, where the vulnerability has been patched.
CVE-2024-50157 affects Linux kernel versions from 6.6 to 6.11.6 and includes specific 6.12 release candidates up to rc3.
The potential impact of CVE-2024-50157 includes system instability and performance issues, specifically soft lockups during FIFO occupancy checks.
CVE-2024-50157 is related to the Linux kernel itself and could potentially affect any Linux distribution utilizing the vulnerable kernel versions.