
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-53229 affects the Linux kernel's RDMA/rxe (Remote Direct Memory Access/RXE) subsystem. The vulnerability was discovered in the queue pair (QP) flush handling mechanism within the requester component. It was disclosed on December 27, 2024, and affects Linux kernel systems utilizing the RDMA/rxe driver (NVD).
The vulnerability occurs when a queue pair (QP) enters an error state, where the status of Work Queue Elements (WQEs) in the queue is not properly set to error. This leads to warning messages in the system log and potential system instability. The issue specifically manifests in the drivers/infiniband/sw/rxe/rxereq.c file, where the WQE status was not being set to IBWCWRFLUSH_ERR when the QP is in error state (Kernel Commit).
When triggered, the vulnerability causes system warnings and potential system instability in environments using the RDMA/rxe driver. The issue affects the reliability of RDMA operations when queue pairs enter error states (NVD).
The vulnerability has been patched in multiple Linux kernel versions. The fix involves properly setting the WQE status to IBWCWRFLUSHERR when the QP is in error state. Users should update to patched kernel versions, including Linux 6.1.128-1 for Debian systems (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."