We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-53094

RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES



Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES While running ISER over SIW, the initiator machine encounters a warning from skb_splice_from_iter() indicating that a slab page is being used in send_page. To address this, it is better to add a sendpage_ok() check within the driver itself, and if it returns 0, then MSG_SPLICE_PAGES flag should be disabled before entering the network stack. A similar issue has been discussed for NVMe in this thread: https://lore.kernel.org/all/20240530142417.146696-1-ofir.gal@volumez.com/ WARNING: CPU: 0 PID: 5342 at net/core/skbuff.c:7140 skb_splice_from_iter+0x173/0x320 Call Trace: tcp_sendmsg_locked+0x368/0xe40 siw_tx_hdt+0x695/0xa40 [siw] siw_qp_sq_process+0x102/0xb00 [siw] siw_sq_resume+0x39/0x110 [siw] siw_run_sq+0x74/0x160 [siw] kthread+0xd2/0x100 ret_from_fork+0x34/0x40 ret_from_fork_asm+0x1a/0x30

Reserved 2024-11-19 | Published 2024-11-21 | Updated 2024-11-21 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f4 before 3406bfc813a9
affected

1da177e4c3f4 before bb5738957d92
affected

1da177e4c3f4 before 4e1e3dd88a4c
affected

Default status
affected

6.6.62
unaffected

6.11.9
unaffected

6.12
unaffected

References

git.kernel.org/...c/3406bfc813a9bbd9c3055795e985f527b7852e8c

git.kernel.org/...c/bb5738957d92c8603a90c9664d34236641c221b2

git.kernel.org/...c/4e1e3dd88a4cedd5ccc1a3fc3d71e03b70a7a791

cve.org (CVE-2024-53094)

nvd.nist.gov (CVE-2024-53094)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-53094

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.