CVE-2024-50157
Vulnerability from cvelistv5
Published
2024-11-07 09:31
Modified
2024-11-07 09:31
Severity ?
EPSS score ?
Summary
RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/infiniband/hw/bnxt_re/main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "2fb6b2e82413", "status": "affected", "version": "2ad4e6303a6d", "versionType": "git" }, { "lessThan": "8be3e5b0c96b", "status": "affected", "version": "2ad4e6303a6d", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/infiniband/hw/bnxt_re/main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.6" }, { "lessThan": "6.6", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.11.*", "status": "unaffected", "version": "6.11.6", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.12-rc4", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop\n\nDriver waits indefinitely for the fifo occupancy to go below a threshold\nas soon as the pacing interrupt is received. This can cause soft lockup on\none of the processors, if the rate of DB is very high.\n\nAdd a loop count for FPGA and exit the __wait_for_fifo_occupancy_below_th\nif the loop is taking more time. Pacing will be continuing until the\noccupancy is below the threshold. This is ensured by the checks in\nbnxt_re_pacing_timer_exp and further scheduling the work for pacing based\non the fifo occupancy." } ], "providerMetadata": { "dateUpdated": "2024-11-07T09:31:34.355Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/2fb6b2e82413e401b72dfeacd7a60416fcfc5b41" }, { "url": "https://git.kernel.org/stable/c/8be3e5b0c96beeefe9d5486b96575d104d3e7d17" } ], "title": "RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-50157", "datePublished": "2024-11-07T09:31:34.355Z", "dateReserved": "2024-10-21T19:36:19.960Z", "dateUpdated": "2024-11-07T09:31:34.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-50157\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-11-07T10:15:07.193\",\"lastModified\":\"2024-11-08T19:01:03.880\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop\\n\\nDriver waits indefinitely for the fifo occupancy to go below a threshold\\nas soon as the pacing interrupt is received. This can cause soft lockup on\\none of the processors, if the rate of DB is very high.\\n\\nAdd a loop count for FPGA and exit the __wait_for_fifo_occupancy_below_th\\nif the loop is taking more time. Pacing will be continuing until the\\noccupancy is below the threshold. This is ensured by the checks in\\nbnxt_re_pacing_timer_exp and further scheduling the work for pacing based\\non the fifo occupancy.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/bnxt_re: Evitar bloqueos de CPU debido al bucle de comprobaci\u00f3n de ocupaci\u00f3n fifo El controlador espera indefinidamente a que la ocupaci\u00f3n fifo baje de un umbral tan pronto como se recibe la interrupci\u00f3n de ritmo. Esto puede provocar un bloqueo suave en uno de los procesadores, si la tasa de DB es muy alta. Agregue un recuento de bucles para FPGA y salga de __wait_for_fifo_occupancy_below_th si el bucle est\u00e1 tomando m\u00e1s tiempo. El ritmo continuar\u00e1 hasta que la ocupaci\u00f3n est\u00e9 por debajo del umbral. Esto se garantiza mediante las comprobaciones en bnxt_re_pacing_timer_exp y la programaci\u00f3n adicional del trabajo para el ritmo en funci\u00f3n de la ocupaci\u00f3n fifo.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2fb6b2e82413e401b72dfeacd7a60416fcfc5b41\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8be3e5b0c96beeefe9d5486b96575d104d3e7d17\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.