๐Ÿ” CVE Alert

CVE-2024-53094

MEDIUM 5.5

RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES While running ISER over SIW, the initiator machine encounters a warning from skb_splice_from_iter() indicating that a slab page is being used in send_page. To address this, it is better to add a sendpage_ok() check within the driver itself, and if it returns 0, then MSG_SPLICE_PAGES flag should be disabled before entering the network stack. A similar issue has been discussed for NVMe in this thread: https://lore.kernel.org/all/[email protected]/ WARNING: CPU: 0 PID: 5342 at net/core/skbuff.c:7140 skb_splice_from_iter+0x173/0x320 Call Trace: tcp_sendmsg_locked+0x368/0xe40 siw_tx_hdt+0x695/0xa40 [siw] siw_qp_sq_process+0x102/0xb00 [siw] siw_sq_resume+0x39/0x110 [siw] siw_run_sq+0x74/0x160 [siw] kthread+0xd2/0x100 ret_from_fork+0x34/0x40 ret_from_fork_asm+0x1a/0x30

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
0e935ae6afcdbe6f0c0aa457ae57feccc63bb9be < 3406bfc813a9bbd9c3055795e985f527b7852e8c 0e935ae6afcdbe6f0c0aa457ae57feccc63bb9be < bb5738957d92c8603a90c9664d34236641c221b2 0e935ae6afcdbe6f0c0aa457ae57feccc63bb9be < 4e1e3dd88a4cedd5ccc1a3fc3d71e03b70a7a791
Linux / Linux
5.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3406bfc813a9bbd9c3055795e985f527b7852e8c git.kernel.org: https://git.kernel.org/stable/c/bb5738957d92c8603a90c9664d34236641c221b2 git.kernel.org: https://git.kernel.org/stable/c/4e1e3dd88a4cedd5ccc1a3fc3d71e03b70a7a791