Release Date: | 2024-11-05 | |
Impact: | Moderate | What is this? |
In the Linux kernel, the following vulnerability has been resolved:\nRDMA/mad: Improve handling of timed out WRs of mad agent\nCurrent timeout handler of mad agent acquires/releases mad_agent_priv\nlock for every timed out WRs. This causes heavy locking contention\nwhen higher no. of WRs are to be handled inside timeout handler.\nThis leads to softlockup with below trace in some use cases where\nrdma-cm path is used to establish connection between peer nodes\nTrace:\n-----\nBUG: soft lockup - CPU#4 stuck for 26s! [kworker/u128:3:19767]\nCPU: 4 PID: 19767 Comm: kworker/u128:3 Kdump: loaded Tainted: G OE\n------- --- 5.14.0-427.13.1.el9_4.x86_64 #1\nHardware name: Dell Inc. PowerEdge R740/01YM03, BIOS 2.4.8 11/26/2019\nWorkqueue: ib_mad1 timeout_sends [ib_core]\nRIP: 0010:__do_softirq+0x78/0x2ac\nRSP: 0018:ffffb253449e4f98 EFLAGS: 00000246\nRAX: 00000000ffffffff RBX: 0000000000000000 RCX: 000000000000001f\nRDX: 000000000000001d RSI: 000000003d1879ab RDI: fff363b66fd3a86b\nRBP: ffffb253604cbcd8 R08: 0000009065635f3b R09: 0000000000000000\nR10: 0000000000000040 R11: ffffb253449e4ff8 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000040\nFS: 0000000000000000(0000) GS:ffff8caa1fc80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fd9ec9db900 CR3: 0000000891934006 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n
See more information about CVE-2024-50095 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 5.5 |
Vector String: | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Version: | 3.1 |
Attack Vector: | Local |
Attack Complexity: | Low |
Privileges Required: | Low |
User Interaction: | None |
Scope: | Unchanged |
Confidentiality Impact: | None |
Integrity Impact: | None |
Availability Impact: | High |
Platform | Errata | Release Date |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: