Skip to main content

CVE-2024-38556: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-38556cvecve-2024-38556
Published: Wed Jun 19 2024 (06/19/2024, 13:35:26 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Add a timeout to acquire the command queue semaphore Prevent forced completion handling on an entry that has not yet been assigned an index, causing an out of bounds access on idx = -22. Instead of waiting indefinitely for the sem, blocking flow now waits for index to be allocated or a sem acquisition timeout before beginning the timer for FW completion. Kernel log example: mlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion

AI-Powered Analysis

AILast updated: 06/28/2025, 03:55:11 UTC

Technical Analysis

CVE-2024-38556 is a vulnerability identified in the Linux kernel's mlx5 driver, which is responsible for managing Mellanox network interface cards (NICs). The issue arises from the handling of the command queue semaphore used to synchronize commands sent to the firmware. Specifically, the vulnerability involves a scenario where forced completion handling is attempted on a command queue entry that has not yet been assigned a valid index, resulting in an out-of-bounds access with an index value of -22. This can cause undefined behavior, including potential kernel crashes or memory corruption. The root cause is the indefinite wait for the semaphore acquisition, which has been addressed by introducing a timeout mechanism. The fix ensures that blocking flows wait either for the index allocation or for the semaphore acquisition timeout before starting the firmware completion timer. This prevents the erroneous forced completion on uninitialized entries. The vulnerability affects multiple Linux kernel versions identified by their commit hashes, indicating it spans several recent kernel releases. The kernel log snippet provided illustrates the error condition where the command with index -22 fails to complete properly. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems utilizing Mellanox mlx5 network adapters running vulnerable Linux kernel versions. Such hardware is common in high-performance computing environments, data centers, and enterprise servers. Exploitation could lead to kernel instability, denial of service (DoS) through system crashes, or potentially memory corruption that might be leveraged for privilege escalation or arbitrary code execution, although no such exploits are currently known. The impact on confidentiality and integrity is therefore potentially significant if an attacker can trigger the vulnerability remotely or locally. Availability is the most immediate concern due to possible kernel panics or system hangs. Organizations relying on Linux-based infrastructure with Mellanox hardware, especially in critical sectors like finance, telecommunications, cloud service providers, and research institutions, could experience service disruptions or degraded performance if this vulnerability is exploited.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernels to versions where this issue is patched. Since the vulnerability relates to the mlx5 driver, organizations should verify if their systems use Mellanox NICs and confirm the kernel version in use. Applying vendor-supplied kernel updates or patches is the most effective mitigation. In environments where immediate patching is not feasible, administrators should monitor kernel logs for signs of the error message 'cmd[-22]: CREATE_UCTX No done completion' as an indicator of attempted exploitation or instability. Additionally, limiting access to systems with vulnerable kernels, especially restricting untrusted users from executing commands that interact with the mlx5 driver, can reduce risk. Network segmentation and strict access controls around critical Linux servers with Mellanox hardware will further minimize exposure. Finally, organizations should engage with their hardware and Linux distribution vendors to obtain timely updates and guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-18T19:36:34.921Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdddec

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 3:55:11 AM

Last updated: 7/21/2025, 5:41:05 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats