{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-53138","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-11-19T17:17:24.996Z","datePublished":"2024-12-04T14:20:43.395Z","dateUpdated":"2025-11-03T22:29:40.765Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:53:59.348Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: kTLS, Fix incorrect page refcounting\n\nThe kTLS tx handling code is using a mix of get_page() and\npage_ref_inc() APIs to increment the page reference. But on the release\npath (mlx5e_ktls_tx_handle_resync_dump_comp()), only put_page() is used.\n\nThis is an issue when using pages from large folios: the get_page()\nreferences are stored on the folio page while the page_ref_inc()\nreferences are stored directly in the given page. On release the folio\npage will be dereferenced too many times.\n\nThis was found while doing kTLS testing with sendfile() + ZC when the\nserved file was read from NFS on a kernel with NFS large folios support\n(commit 49b29a573da8 (\"nfs: add support for large folios\"))."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c"],"versions":[{"version":"84d1bb2b139e0184b1754aa1b5776186b475fce8","lessThan":"a0ddb20a748b122ea86003485f7992fa5e84cc95","status":"affected","versionType":"git"},{"version":"84d1bb2b139e0184b1754aa1b5776186b475fce8","lessThan":"ffad2ac8c859c1c1a981fe9c4f7ff925db684a43","status":"affected","versionType":"git"},{"version":"84d1bb2b139e0184b1754aa1b5776186b475fce8","lessThan":"c7b97f9e794d8e2bbaa50e1d6c230196fd214b5e","status":"affected","versionType":"git"},{"version":"84d1bb2b139e0184b1754aa1b5776186b475fce8","lessThan":"69fbd07f17b0fdaf8970bc705f5bf115c297839d","status":"affected","versionType":"git"},{"version":"84d1bb2b139e0184b1754aa1b5776186b475fce8","lessThan":"93a14620b97c911489a5b008782f3d9b0c4aeff4","status":"affected","versionType":"git"},{"version":"84d1bb2b139e0184b1754aa1b5776186b475fce8","lessThan":"2723e8b2cbd486cb96e5a61b22473f7fd62e18df","status":"affected","versionType":"git"},{"version":"84d1bb2b139e0184b1754aa1b5776186b475fce8","lessThan":"dd6e972cc5890d91d6749bb48e3912721c4e4b25","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/mellanox/mlx5/core/en_accel/ktls_tx.c"],"versions":[{"version":"5.4","status":"affected"},{"version":"0","lessThan":"5.4","status":"unaffected","versionType":"semver"},{"version":"5.4.287","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.231","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.174","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.119","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.63","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.11.10","lessThanOrEqual":"6.11.*","status":"unaffected","versionType":"semver"},{"version":"6.12","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.4.287"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.10.231"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.15.174"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.1.119"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.6.63"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.11.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.12"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/a0ddb20a748b122ea86003485f7992fa5e84cc95"},{"url":"https://git.kernel.org/stable/c/ffad2ac8c859c1c1a981fe9c4f7ff925db684a43"},{"url":"https://git.kernel.org/stable/c/c7b97f9e794d8e2bbaa50e1d6c230196fd214b5e"},{"url":"https://git.kernel.org/stable/c/69fbd07f17b0fdaf8970bc705f5bf115c297839d"},{"url":"https://git.kernel.org/stable/c/93a14620b97c911489a5b008782f3d9b0c4aeff4"},{"url":"https://git.kernel.org/stable/c/2723e8b2cbd486cb96e5a61b22473f7fd62e18df"},{"url":"https://git.kernel.org/stable/c/dd6e972cc5890d91d6749bb48e3912721c4e4b25"}],"title":"net/mlx5e: kTLS, Fix incorrect page refcounting","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:29:40.765Z"}}]}}