![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-38608 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix netif state handling mlx5e_suspend cleans resources
only if netif_device_present() returns true. However, mlx5e_resume
changes the state of netif, via mlx5e_nic_enable, only if reg_state ==
NETREG_REGISTERED. In the below case, the above leads to NULL-ptr
Oops[1] and memory leaks: mlx5e_probe _mlx5e_resume
mlx5e_attach_netdev mlx5e_nic_enable <-- netdev not reg, not calling
netif_device_attach() register_netdev <-- failed for some reason.
ERROR_FLOW: _mlx5e_suspend <-- netif_device_present return false,
resources aren't freed :( Hence, clean resources in this case as well.
[1] BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0 Oops: 0010 [#1] SMP CPU: 2 PID: 9345 Comm: test-ovs-ct-gen
Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1 Hardware
name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:0x0
Code: Unable to access opcode bytes at0xffffffffffffffd6. RSP:
0018:ffff888178aaf758 EFLAGS: 00010246 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-38608 https://git.kernel.org/stable/c/3d5918477f94e4c2f064567875c475468e264644 https://git.kernel.org/stable/c/3d5918477f94e4c2f064567875c475468e264644 https://git.kernel.org/stable/c/f7e6cfb864a53af71c5cc904f1cc22215d68f5c6 https://git.kernel.org/stable/c/f7e6cfb864a53af71c5cc904f1cc22215d68f5c6 |