CVE-2024-42145

In the Linux kernel, the following vulnerability has been resolved: IB/core: Implement a limit on UMAD receive List The existing behavior of ib_umad, which maintains received MAD packets in an unbounded list, poses a risk of uncontrolled growth. As user-space applications extract packets from this list, the rate of extraction may not match the rate of incoming packets, leading to potential list overflow. To address this, we introduce a limit to the size of the list. After considering typical scenarios, such as OpenSM processing, which can handle approximately 100k packets per second, and the 1-second retry timeout for most packets, we set the list size limit to 200k. Packets received beyond this limit are dropped, assuming they are likely timed out by the time they are handled by user-space. Notably, packets queued on the receive list due to reasons like timed-out sends are preserved even when the list is full.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

11 Dec 2024, 15:23

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1288cf1cceb0e6df276e182f5412370fb4169bcb - () https://git.kernel.org/stable/c/1288cf1cceb0e6df276e182f5412370fb4169bcb - Patch
References () https://git.kernel.org/stable/c/62349fbf86b5e13b02721bdadf98c29afd1e7b5f - () https://git.kernel.org/stable/c/62349fbf86b5e13b02721bdadf98c29afd1e7b5f - Patch
References () https://git.kernel.org/stable/c/63d202d948bb6d3a28cd8e8b96b160fa53e18baa - () https://git.kernel.org/stable/c/63d202d948bb6d3a28cd8e8b96b160fa53e18baa - Patch
References () https://git.kernel.org/stable/c/a6627fba793cc75b7365d9504a0095fb2902dda4 - () https://git.kernel.org/stable/c/a6627fba793cc75b7365d9504a0095fb2902dda4 - Patch
References () https://git.kernel.org/stable/c/b4913702419d064ec4c4bbf7270643c95cc89a1b - () https://git.kernel.org/stable/c/b4913702419d064ec4c4bbf7270643c95cc89a1b - Patch
References () https://git.kernel.org/stable/c/b8c5f635997f49c625178d1a0cb32a80ed33abe6 - () https://git.kernel.org/stable/c/b8c5f635997f49c625178d1a0cb32a80ed33abe6 - Patch
References () https://git.kernel.org/stable/c/ca0b44e20a6f3032224599f02e7c8fb49525c894 - () https://git.kernel.org/stable/c/ca0b44e20a6f3032224599f02e7c8fb49525c894 - Patch
References () https://git.kernel.org/stable/c/d73cb8862e4d6760ccc94d3b57b9ef6271400607 - () https://git.kernel.org/stable/c/d73cb8862e4d6760ccc94d3b57b9ef6271400607 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-770
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 09:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1288cf1cceb0e6df276e182f5412370fb4169bcb - () https://git.kernel.org/stable/c/1288cf1cceb0e6df276e182f5412370fb4169bcb -
References () https://git.kernel.org/stable/c/62349fbf86b5e13b02721bdadf98c29afd1e7b5f - () https://git.kernel.org/stable/c/62349fbf86b5e13b02721bdadf98c29afd1e7b5f -
References () https://git.kernel.org/stable/c/63d202d948bb6d3a28cd8e8b96b160fa53e18baa - () https://git.kernel.org/stable/c/63d202d948bb6d3a28cd8e8b96b160fa53e18baa -
References () https://git.kernel.org/stable/c/a6627fba793cc75b7365d9504a0095fb2902dda4 - () https://git.kernel.org/stable/c/a6627fba793cc75b7365d9504a0095fb2902dda4 -
References () https://git.kernel.org/stable/c/b4913702419d064ec4c4bbf7270643c95cc89a1b - () https://git.kernel.org/stable/c/b4913702419d064ec4c4bbf7270643c95cc89a1b -
References () https://git.kernel.org/stable/c/b8c5f635997f49c625178d1a0cb32a80ed33abe6 - () https://git.kernel.org/stable/c/b8c5f635997f49c625178d1a0cb32a80ed33abe6 -
References () https://git.kernel.org/stable/c/ca0b44e20a6f3032224599f02e7c8fb49525c894 - () https://git.kernel.org/stable/c/ca0b44e20a6f3032224599f02e7c8fb49525c894 -
References () https://git.kernel.org/stable/c/d73cb8862e4d6760ccc94d3b57b9ef6271400607 - () https://git.kernel.org/stable/c/d73cb8862e4d6760ccc94d3b57b9ef6271400607 -

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: IB/core: implementar un límite en la lista de recepción de UMAD El comportamiento existente de ib_umad, que mantiene los paquetes MAD recibidos en una lista ilimitada, plantea un riesgo de crecimiento incontrolado. A medida que las aplicaciones del espacio de usuario extraen paquetes de esta lista, es posible que la tasa de extracción no coincida con la tasa de paquetes entrantes, lo que puede provocar un posible desbordamiento de la lista. Para solucionar esto, introducimos un límite al tamaño de la lista. Después de considerar escenarios típicos, como el procesamiento OpenSM, que puede manejar aproximadamente 100 000 paquetes por segundo, y el tiempo de espera de reintento de 1 segundo para la mayoría de los paquetes, establecemos el límite de tamaño de la lista en 200 000. Los paquetes recibidos más allá de este límite se descartan, suponiendo que probablemente se agote el tiempo de espera cuando sean manejados por el espacio de usuario. En particular, los paquetes en cola en la lista de recepción debido a motivos como el tiempo de espera de envío se conservan incluso cuando la lista está llena.

30 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-30 08:15

Updated : 2024-12-11 15:23


NVD link : CVE-2024-42145

Mitre link : CVE-2024-42145

CVE.ORG link : CVE-2024-42145


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-770

Allocation of Resources Without Limits or Throttling