CVE-2024-26744: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Support specifying the srpt_service_guid parameter Make loading ib_srpt with this parameter set work. The current behavior is that setting that parameter while loading the ib_srpt kernel module triggers the following kernel crash: BUG: kernel NULL pointer dereference, address: 0000000000000000 Call Trace: <TASK> parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 entry_SYSCALL_64_after_hwframe+0x6e/0x76
AI Analysis
Technical Summary
CVE-2024-26744 is a vulnerability identified in the Linux kernel specifically related to the RDMA (Remote Direct Memory Access) subsystem's srpt (SCSI RDMA Protocol Target) kernel module. The issue arises when the kernel module ib_srpt is loaded with the srpt_service_guid parameter specified. Under normal circumstances, setting this parameter during module loading should be supported; however, due to this vulnerability, it causes a NULL pointer dereference in the kernel, leading to a kernel crash (BUG). The crash occurs in the parse_one function during argument parsing, which ultimately results in a denial of service (DoS) condition as the kernel becomes unstable or unresponsive. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), indicating that the kernel attempts to access memory at address zero, which is invalid. The CVSS 3.1 base score is 5.5 (medium severity), with the attack vector being local (AV:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting availability (A:H) without affecting confidentiality or integrity. The vulnerability does not appear to have known exploits in the wild yet. The affected versions are identified by a specific commit hash, implying that the issue is present in certain Linux kernel builds prior to the fix. This vulnerability is significant for systems utilizing RDMA and the ib_srpt module, commonly found in high-performance computing, storage networks, and data centers where RDMA is leveraged for low-latency, high-throughput communication.
Potential Impact
For European organizations, the impact of CVE-2024-26744 primarily manifests as a potential denial of service on Linux systems that load the ib_srpt kernel module with the srpt_service_guid parameter. Organizations operating data centers, HPC clusters, or storage infrastructures that rely on RDMA for efficient data transfer could experience system crashes, leading to service interruptions, degraded performance, or downtime. This could affect critical services, especially in sectors such as finance, telecommunications, research institutions, and cloud service providers prevalent in Europe. Although the vulnerability does not compromise confidentiality or integrity, availability disruptions can have cascading effects on business operations, SLAs, and regulatory compliance, particularly under GDPR where service continuity is important. The requirement for local access and low privileges somewhat limits remote exploitation, but insider threats or compromised local accounts could trigger the crash. Given the widespread use of Linux in European IT infrastructure, especially in enterprise and cloud environments, the vulnerability poses a moderate risk that must be addressed promptly to maintain operational stability.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address CVE-2024-26744 as soon as they become available from trusted sources or Linux distribution maintainers. 2. Temporarily avoid loading the ib_srpt kernel module with the srpt_service_guid parameter until patched, or refrain from using this parameter if possible. 3. Implement strict access controls to limit who can load kernel modules or modify kernel parameters, reducing the risk of accidental or malicious triggering of the vulnerability. 4. Monitor system logs and kernel messages for any signs of crashes or abnormal module loading activities related to ib_srpt. 5. For environments where RDMA is critical, consider deploying redundancy and failover mechanisms to mitigate potential downtime caused by kernel crashes. 6. Conduct regular security audits and vulnerability scans focusing on kernel modules and configurations related to RDMA. 7. Educate system administrators about the risks of loading kernel modules with unverified parameters and enforce change management policies to control kernel module updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-26744: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Support specifying the srpt_service_guid parameter Make loading ib_srpt with this parameter set work. The current behavior is that setting that parameter while loading the ib_srpt kernel module triggers the following kernel crash: BUG: kernel NULL pointer dereference, address: 0000000000000000 Call Trace: <TASK> parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 entry_SYSCALL_64_after_hwframe+0x6e/0x76
AI-Powered Analysis
Technical Analysis
CVE-2024-26744 is a vulnerability identified in the Linux kernel specifically related to the RDMA (Remote Direct Memory Access) subsystem's srpt (SCSI RDMA Protocol Target) kernel module. The issue arises when the kernel module ib_srpt is loaded with the srpt_service_guid parameter specified. Under normal circumstances, setting this parameter during module loading should be supported; however, due to this vulnerability, it causes a NULL pointer dereference in the kernel, leading to a kernel crash (BUG). The crash occurs in the parse_one function during argument parsing, which ultimately results in a denial of service (DoS) condition as the kernel becomes unstable or unresponsive. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), indicating that the kernel attempts to access memory at address zero, which is invalid. The CVSS 3.1 base score is 5.5 (medium severity), with the attack vector being local (AV:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting availability (A:H) without affecting confidentiality or integrity. The vulnerability does not appear to have known exploits in the wild yet. The affected versions are identified by a specific commit hash, implying that the issue is present in certain Linux kernel builds prior to the fix. This vulnerability is significant for systems utilizing RDMA and the ib_srpt module, commonly found in high-performance computing, storage networks, and data centers where RDMA is leveraged for low-latency, high-throughput communication.
Potential Impact
For European organizations, the impact of CVE-2024-26744 primarily manifests as a potential denial of service on Linux systems that load the ib_srpt kernel module with the srpt_service_guid parameter. Organizations operating data centers, HPC clusters, or storage infrastructures that rely on RDMA for efficient data transfer could experience system crashes, leading to service interruptions, degraded performance, or downtime. This could affect critical services, especially in sectors such as finance, telecommunications, research institutions, and cloud service providers prevalent in Europe. Although the vulnerability does not compromise confidentiality or integrity, availability disruptions can have cascading effects on business operations, SLAs, and regulatory compliance, particularly under GDPR where service continuity is important. The requirement for local access and low privileges somewhat limits remote exploitation, but insider threats or compromised local accounts could trigger the crash. Given the widespread use of Linux in European IT infrastructure, especially in enterprise and cloud environments, the vulnerability poses a moderate risk that must be addressed promptly to maintain operational stability.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address CVE-2024-26744 as soon as they become available from trusted sources or Linux distribution maintainers. 2. Temporarily avoid loading the ib_srpt kernel module with the srpt_service_guid parameter until patched, or refrain from using this parameter if possible. 3. Implement strict access controls to limit who can load kernel modules or modify kernel parameters, reducing the risk of accidental or malicious triggering of the vulnerability. 4. Monitor system logs and kernel messages for any signs of crashes or abnormal module loading activities related to ib_srpt. 5. For environments where RDMA is critical, consider deploying redundancy and failover mechanisms to mitigate potential downtime caused by kernel crashes. 6. Conduct regular security audits and vulnerability scans focusing on kernel modules and configurations related to RDMA. 7. Educate system administrators about the risks of loading kernel modules with unverified parameters and enforce change management policies to control kernel module updates.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.168Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe3a07
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 6:09:56 PM
Last updated: 7/30/2025, 11:53:57 PM
Views: 14
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.