![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-38595 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix peer devlink set for SF representor devlink port The
cited patch change register devlink flow, and neglect to reflect the
changes for peer devlink set logic. Peer devlink set is triggering a
call trace if done after devl_register.[1] Hence, align peer devlink
set logic with register devlink flow. [1] WARNING: CPU: 4 PID: 3394 at
net/devlink/core.c:155 devlink_rel_nested_in_add+0x177/0x180 CPU: 4
PID: 3394 Comm: kworker/u40:1 Not tainted
6.9.0-rc4_for_linust_min_debug_2024_04_16_14_08 #1 Hardware name: QEMU
Standard PC (Q35 + ICH9, 2009), BIOS
rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Workqueue:
mlx5_vhca_event0 mlx5_vhca_state_work_handler [mlx5_core] RIP:
0010:devlink_rel_nested_in_add+0x177/0x180 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-38595 https://git.kernel.org/stable/c/05d9d7b66836d87c914f8fdd4b062b78e373458d https://git.kernel.org/stable/c/05d9d7b66836d87c914f8fdd4b062b78e373458d https://git.kernel.org/stable/c/3c453e8cc672de1f9c662948dba43176bc68d7f0 https://git.kernel.org/stable/c/3c453e8cc672de1f9c662948dba43176bc68d7f0 https://git.kernel.org/stable/c/a0501201751034ebe7a22bd9483ed28fea1cd213 https://git.kernel.org/stable/c/a0501201751034ebe7a22bd9483ed28fea1cd213 |