vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-53138): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | 2024-12-04 | 2025-02-20 | 2025-05-21 |
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: kTLS, Fix incorrect page refcounting
The kTLS tx handling code is using a mix of get_page() and
page_ref_inc() APIs to increment the page reference. But on the release
path (mlx5e_ktls_tx_handle_resync_dump_comp()), only put_page() is used.
This is an issue when using pages from large folios: the get_page()
references are stored on the folio page while the page_ref_inc()
references are stored directly in the given page. On release the folio
page will be dereferenced too many times.
This was found while doing kTLS testing with sendfile() + ZC when the
served file was read from NFS on a kernel with NFS large folios support
(commit 49b29a573da8 ("nfs: add support for large folios")).
Solution(s)
References
- CVE-2024-53138
- https://attackerkb.com/topics/CVE-2024-53138
- UBUNTU-USN-7276-1
- UBUNTU-USN-7277-1
- UBUNTU-USN-7310-1
- UBUNTU-USN-7387-1
- UBUNTU-USN-7387-2
- UBUNTU-USN-7387-3
- UBUNTU-USN-7388-1
- UBUNTU-USN-7389-1
- UBUNTU-USN-7390-1
- UBUNTU-USN-7391-1
- UBUNTU-USN-7392-1
- UBUNTU-USN-7392-2
- UBUNTU-USN-7392-3
- UBUNTU-USN-7392-4
- UBUNTU-USN-7393-1
- UBUNTU-USN-7401-1
- UBUNTU-USN-7407-1
- UBUNTU-USN-7413-1
- UBUNTU-USN-7421-1
- UBUNTU-USN-7449-1
- UBUNTU-USN-7449-2
- UBUNTU-USN-7450-1
- UBUNTU-USN-7451-1
- UBUNTU-USN-7452-1
- UBUNTU-USN-7453-1
- UBUNTU-USN-7458-1
- UBUNTU-USN-7459-1
- UBUNTU-USN-7459-2
- UBUNTU-USN-7463-1
- UBUNTU-USN-7468-1
- UBUNTU-USN-7523-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.