CVE-2024-35958

Source
https://cve.org/CVERecord?id=CVE-2024-35958
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35958.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35958
Downstream
Related
Published
2024-05-20T09:41:50.585Z
Modified
2026-03-14T12:34:06.190447Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
net: ena: Fix incorrect descriptor free behavior
Details

In the Linux kernel, the following vulnerability has been resolved:

net: ena: Fix incorrect descriptor free behavior

ENA has two types of TX queues: - queues which only process TX packets arriving from the network stack - queues which only process TX packets forwarded to it by XDPREDIRECT or XDPTX instructions

The enafreetxbufs() cycles through all descriptors in a TX queue and unmaps + frees every descriptor that hasn't been acknowledged yet by the device (uncompleted TX transactions). The function assumes that the processed TX queue is necessarily from the first category listed above and ends up using napiconsume_skb() for descriptors belonging to an XDP specific queue.

This patch solves a bug in which, in case of a VF reset, the descriptors aren't freed correctly, leading to crashes.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35958.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
548c4940b9f1f527f81509468dd60b61418880b6
Fixed
b26aa765f7437e1bbe8db4c1641b12bd5dd378f0
Fixed
fdfbf54d128ab6ab255db138488f9650485795a2
Fixed
19ff8fed3338898b70b2aad831386c78564912e1
Fixed
5c7f2240d9835a7823d87f7460d8eae9f4e504c7
Fixed
c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d
Fixed
bf02d9fe00632d22fa91d34749c7aacf397b6cde

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35958.json"