๐Ÿ” CVE Alert

CVE-2024-50001

UNKNOWN 0.0

net/mlx5: Fix error path in multi-packet WQE transmit

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix error path in multi-packet WQE transmit Remove the erroneous unmap in case no DMA mapping was established The multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. This could fail, e.g. under memory pressure, when the IOMMU driver just can't allocate more memory for page tables. While the code tries to handle this in the path below the err_unmap label it erroneously unmaps one entry from the sq's FIFO list of active mappings. Since the current map attempt failed this unmap is removing some random DMA mapping that might still be required. If the PCI function now presents that IOVA, the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI function in error state. The erroneous behavior was seen in a stress-test environment that created memory pressure.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5af75c747e2a868abbf8611494b50ed5e076fca7 < ca36d6c1a49b6965c86dd528a73f38bc62d9c625 5af75c747e2a868abbf8611494b50ed5e076fca7 < ce828b347cf1b3c1b12b091d02463c35ce5097f5 5af75c747e2a868abbf8611494b50ed5e076fca7 < fc357e78176945ca7bcacf92ab794b9ccd41b4f4 5af75c747e2a868abbf8611494b50ed5e076fca7 < 26fad69b34fcba80d5c7d9e651f628e6ac927754 5af75c747e2a868abbf8611494b50ed5e076fca7 < ecf310aaf256acbc8182189fe0aa1021c3ddef72 5af75c747e2a868abbf8611494b50ed5e076fca7 < 8bb8c12fb5e2b1f03d603d493c92941676f109b5 5af75c747e2a868abbf8611494b50ed5e076fca7 < 2bcae12c795f32ddfbf8c80d1b5f1d3286341c32
Linux / Linux
5.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ca36d6c1a49b6965c86dd528a73f38bc62d9c625 git.kernel.org: https://git.kernel.org/stable/c/ce828b347cf1b3c1b12b091d02463c35ce5097f5 git.kernel.org: https://git.kernel.org/stable/c/fc357e78176945ca7bcacf92ab794b9ccd41b4f4 git.kernel.org: https://git.kernel.org/stable/c/26fad69b34fcba80d5c7d9e651f628e6ac927754 git.kernel.org: https://git.kernel.org/stable/c/ecf310aaf256acbc8182189fe0aa1021c3ddef72 git.kernel.org: https://git.kernel.org/stable/c/8bb8c12fb5e2b1f03d603d493c92941676f109b5 git.kernel.org: https://git.kernel.org/stable/c/2bcae12c795f32ddfbf8c80d1b5f1d3286341c32 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html