Skip to main content

CVE-2024-38539: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-38539cvecve-2024-38539
Published: Wed Jun 19 2024 (06/19/2024, 13:35:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw When running blktests nvme/rdma, the following kmemleak issue will appear. kmemleak: Kernel memory leak detector initialized (mempool available:36041) kmemleak: Automatic memory scanning thread started kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) unreferenced object 0xffff88855da53400 (size 192): comm "rdma", pid 10630, jiffies 4296575922 hex dump (first 32 bytes): 37 00 00 00 00 00 00 00 c0 ff ff ff 1f 00 00 00 7............... 10 34 a5 5d 85 88 ff ff 10 34 a5 5d 85 88 ff ff .4.].....4.].... backtrace (crc 47f66721): [<ffffffff911251bd>] kmalloc_trace+0x30d/0x3b0 [<ffffffffc2640ff7>] alloc_gid_entry+0x47/0x380 [ib_core] [<ffffffffc2642206>] add_modify_gid+0x166/0x930 [ib_core] [<ffffffffc2643468>] ib_cache_update.part.0+0x6d8/0x910 [ib_core] [<ffffffffc2644e1a>] ib_cache_setup_one+0x24a/0x350 [ib_core] [<ffffffffc263949e>] ib_register_device+0x9e/0x3a0 [ib_core] [<ffffffffc2a3d389>] 0xffffffffc2a3d389 [<ffffffffc2688cd8>] nldev_newlink+0x2b8/0x520 [ib_core] [<ffffffffc2645fe3>] rdma_nl_rcv_msg+0x2c3/0x520 [ib_core] [<ffffffffc264648c>] rdma_nl_rcv_skb.constprop.0.isra.0+0x23c/0x3a0 [ib_core] [<ffffffff9270e7b5>] netlink_unicast+0x445/0x710 [<ffffffff9270f1f1>] netlink_sendmsg+0x761/0xc40 [<ffffffff9249db29>] __sys_sendto+0x3a9/0x420 [<ffffffff9249dc8c>] __x64_sys_sendto+0xdc/0x1b0 [<ffffffff92db0ad3>] do_syscall_64+0x93/0x180 [<ffffffff92e00126>] entry_SYSCALL_64_after_hwframe+0x71/0x79 The root cause: rdma_put_gid_attr is not called when sgid_attr is set to ERR_PTR(-ENODEV).

AI-Powered Analysis

AILast updated: 06/29/2025, 11:09:51 UTC

Technical Analysis

CVE-2024-38539 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the rdma_core component. The issue relates to a kernel memory leak detected during the execution of blktests nvme/rdma tests, which are used to validate block device and NVMe over RDMA functionality. The memory leak is caused by improper handling of GID (Global Identifier) attributes in the RDMA core code. Specifically, the function rdma_put_gid_attr is not called when the sgid_attr pointer is set to ERR_PTR(-ENODEV), leading to unreferenced kernel memory objects that are not freed correctly. This results in kmemleak warnings indicating suspected memory leaks. The backtrace provided shows the leak occurs during operations involving GID entry allocation and modification, cache updates, device registration, and netlink message handling within the ib_core kernel module, which manages InfiniBand and RDMA devices. Although the vulnerability does not appear to be exploitable for remote code execution or privilege escalation, the memory leak can cause gradual kernel memory consumption, potentially leading to degraded system performance or stability issues over time, especially on systems heavily utilizing RDMA for high-performance networking and storage. The root cause is a missing cleanup call in error handling paths when the sgid_attr is invalid, which has been fixed in the updated Linux kernel versions. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, particularly those operating data centers, HPC clusters, or enterprise storage solutions that leverage RDMA over InfiniBand or RoCE (RDMA over Converged Ethernet), this vulnerability could lead to kernel memory leaks that degrade system reliability and availability. Over time, unaddressed memory leaks can cause increased memory pressure, kernel instability, or crashes, impacting critical infrastructure and services. Organizations in sectors such as finance, telecommunications, research institutions, and cloud service providers that rely on Linux servers with RDMA capabilities are at higher risk of operational disruption. While this vulnerability does not directly lead to data breaches or privilege escalation, the indirect impact on system uptime and performance can affect service level agreements and operational continuity. Given the widespread use of Linux in European IT environments and the growing adoption of RDMA for low-latency networking, timely patching is important to maintain system health and avoid potential downtime.

Mitigation Recommendations

1. Apply the latest Linux kernel patches that address CVE-2024-38539 as soon as they become available from trusted Linux distributions or kernel maintainers. 2. Monitor kernel memory usage and kmemleak reports on systems utilizing RDMA to detect early signs of memory leaks. 3. Limit the use of RDMA features to only necessary systems and workloads until patched, reducing exposure. 4. Implement robust system monitoring and alerting for kernel stability metrics to quickly identify and respond to memory-related issues. 5. For environments using custom or older kernels, backport the fix or upgrade to a supported kernel version that includes the patch. 6. Coordinate with hardware vendors and software providers to ensure compatibility and support for updated kernel versions with the fix. 7. Conduct thorough testing of RDMA functionality post-patching to confirm that the fix does not introduce regressions or performance degradation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-18T19:36:34.918Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe28f6

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 11:09:51 AM

Last updated: 8/17/2025, 7:42:44 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats