Skip to main content

CVE-2024-36945: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-36945cvecve-2024-36945
Published: Thu May 30 2024 (05/30/2024, 15:35:43 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/smc: fix neighbour and rtable leak in smc_ib_find_route() In smc_ib_find_route(), the neighbour found by neigh_lookup() and rtable resolved by ip_route_output_flow() are not released or put before return. It may cause the refcount leak, so fix it.

AI-Powered Analysis

AILast updated: 06/29/2025, 10:27:05 UTC

Technical Analysis

CVE-2024-36945 is a vulnerability identified in the Linux kernel, specifically within the subsystem handling SMC (Shared Memory Communications) over InfiniBand (smc_ib). The issue arises in the function smc_ib_find_route(), which is responsible for determining the routing path for SMC connections over InfiniBand networks. Within this function, two key resources are acquired: a neighbour object via neigh_lookup() and a routing table entry via ip_route_output_flow(). The vulnerability is due to these resources not being properly released or dereferenced before the function returns, resulting in a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially leading to degraded system performance or denial of service (DoS) conditions. Although this is not a direct code execution or privilege escalation vulnerability, the improper management of kernel resources can be exploited by an attacker to cause instability or crashes in affected systems. The vulnerability affects Linux kernel versions identified by the commit hash e5c4744cfb598f98672f8d21d59ef2c1fa9c9b5f and possibly other versions incorporating this code. The fix involves ensuring that the neighbour and routing table references are properly released before the function returns, preventing the reference count leak. There are no known exploits in the wild at this time, and no CVSS score has been assigned. This vulnerability is primarily relevant to systems using the SMC over InfiniBand feature, which is typically found in high-performance computing or specialized enterprise environments.

Potential Impact

For European organizations, the impact of CVE-2024-36945 depends largely on their use of Linux systems with SMC over InfiniBand enabled. Organizations operating data centers, research institutions, or enterprises with high-performance computing clusters may be affected. The reference count leak can lead to kernel resource exhaustion, causing system instability or denial of service, which can disrupt critical services or workloads. While this vulnerability does not directly compromise confidentiality or integrity, availability can be significantly impacted if exploited or triggered by workload patterns. This could result in downtime, loss of productivity, or interruption of critical business processes. Given the specialized nature of the affected subsystem, the broader impact on typical enterprise Linux deployments without InfiniBand SMC usage is limited. However, organizations relying on these features should prioritize patching to maintain system reliability and prevent potential service disruptions.

Mitigation Recommendations

To mitigate CVE-2024-36945, European organizations should: 1) Identify Linux systems running kernels with the affected commit or versions and determine if SMC over InfiniBand is in use. 2) Apply the official Linux kernel patches that fix the reference count leak in smc_ib_find_route() as soon as they become available from trusted sources or distributions. 3) If immediate patching is not feasible, consider disabling the SMC over InfiniBand feature temporarily to prevent triggering the leak. 4) Monitor system logs and kernel metrics for signs of resource leaks or instability that could indicate exploitation or impact from this vulnerability. 5) Engage with Linux distribution vendors for backported patches and security advisories relevant to their specific kernel versions. 6) Incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation. These steps go beyond generic advice by focusing on the specific subsystem and usage scenarios relevant to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-30T15:25:07.079Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe275c

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 10:27:05 AM

Last updated: 7/31/2025, 5:05:39 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats