{"uuid": "01af0f05-18ae-4a55-a989-5fd6bba34db0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50297", "type": "seen", "source": "https://t.me/cvedetector/11424", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50297 - Xilinx AXIENet DMAEngine Queue DQL Enqueue Crash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50297 \nPublished : Nov. 19, 2024, 2:16 a.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: xilinx: axienet: Enqueue Tx packets in dql before dmaengine starts  \n  \nEnqueue packets in dql after dma engine starts causes race condition.  \nTx transfer starts once dma engine is started and may execute dql dequeue  \nin completion before it gets queued. It results in following kernel crash  \nwhile running iperf stress test:  \n  \nkernel BUG at lib/dynamic_queue_limits.c:99!  \n  \nInternal error: Oops - BUG: 00000000f2000800 [#1] SMP  \npc : dql_completed+0x238/0x248  \nlr : dql_completed+0x3c/0x248  \n  \nCall trace:  \n  dql_completed+0x238/0x248  \n  axienet_dma_tx_cb+0xa0/0x170  \n  xilinx_dma_do_tasklet+0xdc/0x290  \n  tasklet_action_common+0xf8/0x11c  \n  tasklet_action+0x30/0x3c  \n  handle_softirqs+0xf8/0x230  \n  \n  \nStart dmaengine after enqueue in dql fixes the crash. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T04:16:04.000000Z"}