{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-38555","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-06-18T19:36:34.920Z","datePublished":"2024-06-19T13:35:26.059Z","dateUpdated":"2025-05-04T12:56:44.500Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T12:56:44.500Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Discard command completions in internal error\n\nFix use after free when FW completion arrives while device is in\ninternal error state. Avoid calling completion handler in this case,\nsince the device will flush the command interface and trigger all\ncompletions manually.\n\nKernel log:\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\n...\nRIP: 0010:refcount_warn_saturate+0xd8/0xe0\n...\nCall Trace:\n<IRQ>\n? __warn+0x79/0x120\n? refcount_warn_saturate+0xd8/0xe0\n? report_bug+0x17c/0x190\n? handle_bug+0x3c/0x60\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? refcount_warn_saturate+0xd8/0xe0\ncmd_ent_put+0x13b/0x160 [mlx5_core]\nmlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]\ncmd_comp_notifier+0x1f/0x30 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nmlx5_eq_async_int+0xf6/0x290 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nirq_int_handler+0x19/0x30 [mlx5_core]\n__handle_irq_event_percpu+0x4b/0x160\nhandle_irq_event+0x2e/0x80\nhandle_edge_irq+0x98/0x230\n__common_interrupt+0x3b/0xa0\ncommon_interrupt+0x7b/0xa0\n</IRQ>\n<TASK>\nasm_common_interrupt+0x22/0x40"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/mellanox/mlx5/core/cmd.c"],"versions":[{"version":"27c79b3a9212cf4ba634c157e07d29548181a208","lessThan":"f6fbb8535e990f844371086ab2c1221f71f993d3","status":"affected","versionType":"git"},{"version":"51d138c2610a236c1ed0059d034ee4c74f452b86","lessThan":"3cb92b0ad73d3f1734e812054e698d655e9581b0","status":"affected","versionType":"git"},{"version":"51d138c2610a236c1ed0059d034ee4c74f452b86","lessThan":"bf8aaf0ae01c27ae3c06aa8610caf91e50393396","status":"affected","versionType":"git"},{"version":"51d138c2610a236c1ed0059d034ee4c74f452b86","lessThan":"1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb","status":"affected","versionType":"git"},{"version":"51d138c2610a236c1ed0059d034ee4c74f452b86","lessThan":"1d5dce5e92a70274de67a59e1e674c3267f94cd7","status":"affected","versionType":"git"},{"version":"51d138c2610a236c1ed0059d034ee4c74f452b86","lessThan":"7ac4c69c34240c6de820492c0a28a0bd1494265a","status":"affected","versionType":"git"},{"version":"51d138c2610a236c1ed0059d034ee4c74f452b86","lessThan":"db9b31aa9bc56ff0d15b78f7e827d61c4a096e40","status":"affected","versionType":"git"},{"version":"2e5d24b3bf091802c5456dc8f8f6a6be4493c8ca","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/mellanox/mlx5/core/cmd.c"],"versions":[{"version":"5.12","status":"affected"},{"version":"0","lessThan":"5.12","status":"unaffected","versionType":"semver"},{"version":"5.10.219","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.161","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.93","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.33","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.8.12","lessThanOrEqual":"6.8.*","status":"unaffected","versionType":"semver"},{"version":"6.9.3","lessThanOrEqual":"6.9.*","status":"unaffected","versionType":"semver"},{"version":"6.10","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.20","versionEndExcluding":"5.10.219"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"5.15.161"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.1.93"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.6.33"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.8.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.9.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11.3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/f6fbb8535e990f844371086ab2c1221f71f993d3"},{"url":"https://git.kernel.org/stable/c/3cb92b0ad73d3f1734e812054e698d655e9581b0"},{"url":"https://git.kernel.org/stable/c/bf8aaf0ae01c27ae3c06aa8610caf91e50393396"},{"url":"https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb"},{"url":"https://git.kernel.org/stable/c/1d5dce5e92a70274de67a59e1e674c3267f94cd7"},{"url":"https://git.kernel.org/stable/c/7ac4c69c34240c6de820492c0a28a0bd1494265a"},{"url":"https://git.kernel.org/stable/c/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40"}],"title":"net/mlx5: Discard command completions in internal error","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T04:12:25.241Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/f6fbb8535e990f844371086ab2c1221f71f993d3","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/3cb92b0ad73d3f1734e812054e698d655e9581b0","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/bf8aaf0ae01c27ae3c06aa8610caf91e50393396","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/1d5dce5e92a70274de67a59e1e674c3267f94cd7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/7ac4c69c34240c6de820492c0a28a0bd1494265a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-38555","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T17:14:41.121534Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:34:56.983Z"}}]}}