Overview
About vulnerability
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Discard command completions in internal error
Fix use after free when FW completion arrives while device is in internal error state. Avoid calling completion handler in this case, since the device will flush the command interface and trigger all completions manually.
Kernel log:
————[ cut here ]————
refcount_t: underflow; use-after-free.
…
RIP: 0010:refcount_warn_saturate+0xd8/0xe0
…
Call Trace:
Details
- Affected product:
- AlmaLinux 9.2 ESU , CentOS 6 ELS , CentOS 7 ELS , CentOS 8.4 ELS , CentOS 8.5 ELS , CentOS Stream 8 ELS , CloudLinux 6 ELS , CloudLinux 7 ELS , Oracle Linux 6 ELS , Oracle Linux 7 ELS , RHEL 7 ELS
- Affected packages:
- kernel @ 4.18.0 (+11 more)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Discard command completions in internal error
Fix use after free when FW completion arrives while device is in internal error state. Avoid calling completion handler in this case, since the device will flush the command interface and trigger all completions manually.
Kernel log:
————[ cut here ]————
refcount_t: underflow; use-after-free.
…
RIP: 0010:refcount_warn_saturate+0xd8/0xe0
…
Call Trace: