CVE-2024-36945: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/smc: fix neighbour and rtable leak in smc_ib_find_route() In smc_ib_find_route(), the neighbour found by neigh_lookup() and rtable resolved by ip_route_output_flow() are not released or put before return. It may cause the refcount leak, so fix it.
AI Analysis
Technical Summary
CVE-2024-36945 is a vulnerability identified in the Linux kernel, specifically within the subsystem handling SMC (Shared Memory Communications) over InfiniBand (smc_ib). The issue arises in the function smc_ib_find_route(), which is responsible for determining the routing path for SMC connections over InfiniBand networks. Within this function, two key resources are acquired: a neighbour object via neigh_lookup() and a routing table entry via ip_route_output_flow(). The vulnerability is due to these resources not being properly released or dereferenced before the function returns, resulting in a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially leading to degraded system performance or denial of service (DoS) conditions. Although this is not a direct code execution or privilege escalation vulnerability, the improper management of kernel resources can be exploited by an attacker to cause instability or crashes in affected systems. The vulnerability affects Linux kernel versions identified by the commit hash e5c4744cfb598f98672f8d21d59ef2c1fa9c9b5f and possibly other versions incorporating this code. The fix involves ensuring that the neighbour and routing table references are properly released before the function returns, preventing the reference count leak. There are no known exploits in the wild at this time, and no CVSS score has been assigned. This vulnerability is primarily relevant to systems using the SMC over InfiniBand feature, which is typically found in high-performance computing or specialized enterprise environments.
Potential Impact
For European organizations, the impact of CVE-2024-36945 depends largely on their use of Linux systems with SMC over InfiniBand enabled. Organizations operating data centers, research institutions, or enterprises with high-performance computing clusters may be affected. The reference count leak can lead to kernel resource exhaustion, causing system instability or denial of service, which can disrupt critical services or workloads. While this vulnerability does not directly compromise confidentiality or integrity, availability can be significantly impacted if exploited or triggered by workload patterns. This could result in downtime, loss of productivity, or interruption of critical business processes. Given the specialized nature of the affected subsystem, the broader impact on typical enterprise Linux deployments without InfiniBand SMC usage is limited. However, organizations relying on these features should prioritize patching to maintain system reliability and prevent potential service disruptions.
Mitigation Recommendations
To mitigate CVE-2024-36945, European organizations should: 1) Identify Linux systems running kernels with the affected commit or versions and determine if SMC over InfiniBand is in use. 2) Apply the official Linux kernel patches that fix the reference count leak in smc_ib_find_route() as soon as they become available from trusted sources or distributions. 3) If immediate patching is not feasible, consider disabling the SMC over InfiniBand feature temporarily to prevent triggering the leak. 4) Monitor system logs and kernel metrics for signs of resource leaks or instability that could indicate exploitation or impact from this vulnerability. 5) Engage with Linux distribution vendors for backported patches and security advisories relevant to their specific kernel versions. 6) Incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation. These steps go beyond generic advice by focusing on the specific subsystem and usage scenarios relevant to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Switzerland, Italy
CVE-2024-36945: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/smc: fix neighbour and rtable leak in smc_ib_find_route() In smc_ib_find_route(), the neighbour found by neigh_lookup() and rtable resolved by ip_route_output_flow() are not released or put before return. It may cause the refcount leak, so fix it.
AI-Powered Analysis
Technical Analysis
CVE-2024-36945 is a vulnerability identified in the Linux kernel, specifically within the subsystem handling SMC (Shared Memory Communications) over InfiniBand (smc_ib). The issue arises in the function smc_ib_find_route(), which is responsible for determining the routing path for SMC connections over InfiniBand networks. Within this function, two key resources are acquired: a neighbour object via neigh_lookup() and a routing table entry via ip_route_output_flow(). The vulnerability is due to these resources not being properly released or dereferenced before the function returns, resulting in a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially leading to degraded system performance or denial of service (DoS) conditions. Although this is not a direct code execution or privilege escalation vulnerability, the improper management of kernel resources can be exploited by an attacker to cause instability or crashes in affected systems. The vulnerability affects Linux kernel versions identified by the commit hash e5c4744cfb598f98672f8d21d59ef2c1fa9c9b5f and possibly other versions incorporating this code. The fix involves ensuring that the neighbour and routing table references are properly released before the function returns, preventing the reference count leak. There are no known exploits in the wild at this time, and no CVSS score has been assigned. This vulnerability is primarily relevant to systems using the SMC over InfiniBand feature, which is typically found in high-performance computing or specialized enterprise environments.
Potential Impact
For European organizations, the impact of CVE-2024-36945 depends largely on their use of Linux systems with SMC over InfiniBand enabled. Organizations operating data centers, research institutions, or enterprises with high-performance computing clusters may be affected. The reference count leak can lead to kernel resource exhaustion, causing system instability or denial of service, which can disrupt critical services or workloads. While this vulnerability does not directly compromise confidentiality or integrity, availability can be significantly impacted if exploited or triggered by workload patterns. This could result in downtime, loss of productivity, or interruption of critical business processes. Given the specialized nature of the affected subsystem, the broader impact on typical enterprise Linux deployments without InfiniBand SMC usage is limited. However, organizations relying on these features should prioritize patching to maintain system reliability and prevent potential service disruptions.
Mitigation Recommendations
To mitigate CVE-2024-36945, European organizations should: 1) Identify Linux systems running kernels with the affected commit or versions and determine if SMC over InfiniBand is in use. 2) Apply the official Linux kernel patches that fix the reference count leak in smc_ib_find_route() as soon as they become available from trusted sources or distributions. 3) If immediate patching is not feasible, consider disabling the SMC over InfiniBand feature temporarily to prevent triggering the leak. 4) Monitor system logs and kernel metrics for signs of resource leaks or instability that could indicate exploitation or impact from this vulnerability. 5) Engage with Linux distribution vendors for backported patches and security advisories relevant to their specific kernel versions. 6) Incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation. These steps go beyond generic advice by focusing on the specific subsystem and usage scenarios relevant to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-30T15:25:07.079Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe275c
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 10:27:05 AM
Last updated: 7/31/2025, 5:05:39 PM
Views: 10
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.