Skip to main content

CVE-2024-26907: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26907cvecve-2024-26907
Published: Wed Apr 17 2024 (04/17/2024, 10:27:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix fortify source warning while accessing Eth segment ------------[ cut here ]------------ memcpy: detected field-spanning write (size 56) of single field "eseg->inline_hdr.start" at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 (size 2) WARNING: CPU: 0 PID: 293779 at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] Modules linked in: 8021q garp mrp stp llc rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) mlx5_core(OE) pci_hyperv_intf mlxdevm(OE) mlx_compat(OE) tls mlxfw(OE) psample nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink mst_pciconf(OE) knem(OE) vfio_pci vfio_pci_core vfio_iommu_type1 vfio iommufd irqbypass cuse nfsv3 nfs fscache netfs xfrm_user xfrm_algo ipmi_devintf ipmi_msghandler binfmt_misc crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 snd_pcsp aesni_intel crypto_simd cryptd snd_pcm snd_timer joydev snd soundcore input_leds serio_raw evbug nfsd auth_rpcgss nfs_acl lockd grace sch_fq_codel sunrpc drm efi_pstore ip_tables x_tables autofs4 psmouse virtio_net net_failover failover floppy [last unloaded: mlx_compat(OE)] CPU: 0 PID: 293779 Comm: ssh Tainted: G OE 6.2.0-32-generic #32~22.04.1-Ubuntu Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 RIP: 0010:mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] Code: 0c 01 00 a8 01 75 25 48 8b 75 a0 b9 02 00 00 00 48 c7 c2 10 5b fd c0 48 c7 c7 80 5b fd c0 c6 05 57 0c 03 00 01 e8 95 4d 93 da <0f> 0b 44 8b 4d b0 4c 8b 45 c8 48 8b 4d c0 e9 49 fb ff ff 41 0f b7 RSP: 0018:ffffb5b48478b570 EFLAGS: 00010046 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffb5b48478b628 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffb5b48478b5e8 R13: ffff963a3c609b5e R14: ffff9639c3fbd800 R15: ffffb5b480475a80 FS: 00007fc03b444c80(0000) GS:ffff963a3dc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000556f46bdf000 CR3: 0000000006ac6003 CR4: 00000000003706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ? show_regs+0x72/0x90 ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] ? __warn+0x8d/0x160 ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] ? report_bug+0x1bb/0x1d0 ? handle_bug+0x46/0x90 ? exc_invalid_op+0x19/0x80 ? asm_exc_invalid_op+0x1b/0x20 ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib] mlx5_ib_post_send_nodrain+0xb/0x20 [mlx5_ib] ipoib_send+0x2ec/0x770 [ib_ipoib] ipoib_start_xmit+0x5a0/0x770 [ib_ipoib] dev_hard_start_xmit+0x8e/0x1e0 ? validate_xmit_skb_list+0x4d/0x80 sch_direct_xmit+0x116/0x3a0 __dev_xmit_skb+0x1fd/0x580 __dev_queue_xmit+0x284/0x6b0 ? _raw_spin_unlock_irq+0xe/0x50 ? __flush_work.isra.0+0x20d/0x370 ? push_pseudo_header+0x17/0x40 [ib_ipoib] neigh_connected_output+0xcd/0x110 ip_finish_output2+0x179/0x480 ? __smp_call_single_queue+0x61/0xa0 __ip_finish_output+0xc3/0x190 ip_finish_output+0x2e/0xf0 ip_output+0x78/0x110 ? __pfx_ip_finish_output+0x10/0x10 ip_local_out+0x64/0x70 __ip_queue_xmit+0x18a/0x460 ip_queue_xmit+0x15/0x30 __tcp_transmit_skb+0x914/0x9c0 tcp_write_xmit+0x334/0x8d0 tcp_push_one+0x3c/0x60 tcp_sendmsg_locked+0x2e1/0xac0 tcp_sendmsg+0x2d/0x50 inet_sendmsg+0x43/0x90 sock_sendmsg+0x68/0x80 sock_write_iter+0x93/0x100 vfs_write+0x326/0x3c0 ksys_write+0xbd/0xf0 ? do_syscall_64+0x69/0x90 __x64_sys_write+0x19/0x30 do_syscall_ ---truncated---

AI-Powered Analysis

AILast updated: 07/03/2025, 01:56:55 UTC

Technical Analysis

CVE-2024-26907 is a high-severity vulnerability affecting the Linux kernel, specifically within the RDMA (Remote Direct Memory Access) mlx5 driver component. The vulnerability arises from a field-spanning write detected in the mlx5_ib_post_send function, located in the mlx5_ib kernel module responsible for handling Mellanox InfiniBand and RDMA network devices. The issue is related to a memcpy operation that improperly writes 56 bytes over a single 2-byte field named "eseg->inline_hdr.start". This improper memory operation triggers a fortify source warning and leads to a kernel warning and potential instability or crash. The vulnerability is classified under CWE-416, which corresponds to use-after-free or invalid memory access errors, indicating that the write operation could corrupt kernel memory or lead to undefined behavior. The vulnerability requires local privileges (AV:L) and low attack complexity (AC:L), with privileges needed (PR:L) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning exploitation could allow an attacker to execute arbitrary code in kernel context, cause denial of service via kernel crashes, or escalate privileges. The vulnerability affects Linux kernel versions incorporating the mlx5_ib driver, commonly used in environments utilizing Mellanox RDMA-capable network cards, which are prevalent in high-performance computing, data centers, and enterprise environments. The vulnerability was published on April 17, 2024, and no known exploits are currently reported in the wild. The detailed kernel stack trace and module list indicate the issue occurs during packet send operations over RDMA interfaces, which could be triggered by malicious or malformed network traffic or local processes interacting with RDMA devices. The patch status is not explicitly provided, so users should verify kernel updates from their Linux distribution vendors or Mellanox for fixes addressing this issue.

Potential Impact

For European organizations, especially those operating data centers, cloud infrastructure, or high-performance computing clusters that utilize RDMA technology with Mellanox hardware, this vulnerability poses a significant risk. Exploitation could lead to kernel crashes causing denial of service, potentially disrupting critical services and applications. More severely, attackers with local access could leverage this flaw to escalate privileges to kernel level, compromising system integrity and confidentiality. This is particularly concerning for sectors such as finance, telecommunications, research institutions, and government agencies where data sensitivity and uptime are critical. The high impact on confidentiality, integrity, and availability means that successful exploitation could lead to data breaches, unauthorized control over systems, and prolonged outages. Given the complexity and specialized hardware involved, exploitation may be limited to environments with RDMA-capable devices, but these are increasingly common in European enterprise and cloud environments. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediately verify and apply Linux kernel updates from trusted vendors or distributions that address CVE-2024-26907, ensuring the mlx5_ib driver is patched. 2) For environments using Mellanox RDMA hardware, coordinate with hardware and software vendors to confirm firmware and driver compatibility with patched kernels. 3) Restrict local access to systems with RDMA devices to trusted administrators only, minimizing the risk of local exploitation. 4) Implement strict network segmentation and access controls to limit exposure of RDMA interfaces to untrusted networks or users. 5) Monitor kernel logs and system behavior for unusual warnings or crashes related to mlx5_ib or RDMA operations, enabling early detection of exploitation attempts. 6) Employ security tools capable of detecting anomalous kernel activity or memory corruption attempts. 7) Consider disabling RDMA functionality temporarily if patching is delayed and the environment does not critically depend on it. 8) Maintain up-to-date backups and incident response plans tailored to kernel-level compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.187Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3eec

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 7/3/2025, 1:56:55 AM

Last updated: 8/18/2025, 11:25:12 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats