CVE-2024-38597: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: eth: sungem: remove .ndo_poll_controller to avoid deadlocks Erhard reports netpoll warnings from sungem: netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398) WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c gem_poll_controller() disables interrupts, which may sleep. We can't sleep in netpoll, it has interrupts disabled completely. Strangely, gem_poll_controller() doesn't even poll the completions, and instead acts as if an interrupt has fired so it just schedules NAPI and exits. None of this has been necessary for years, since netpoll invokes NAPI directly.
AI Analysis
Technical Summary
CVE-2024-38597 addresses a vulnerability in the Linux kernel's network driver subsystem, specifically related to the 'sungem' Ethernet driver. The issue arises from the presence of the .ndo_poll_controller callback in the sungem driver, which is responsible for polling network device completions. The vulnerability manifests as a deadlock risk due to improper handling of interrupt disabling and sleeping behavior within the netpoll context. Netpoll is a kernel mechanism used for network packet polling, often utilized for debugging and network diagnostics. The problem is that gem_poll_controller() disables interrupts but then performs operations that may sleep, which is forbidden in netpoll since it operates with interrupts fully disabled. Additionally, gem_poll_controller() does not actually poll completions but instead simulates an interrupt by scheduling NAPI (New API) processing and then exits. This behavior is outdated and unnecessary because netpoll now invokes NAPI directly. The presence of .ndo_poll_controller in sungem leads to netpoll warnings and potential deadlocks, which can affect network stability and reliability. The fix involves removing the .ndo_poll_controller callback from the sungem driver to prevent these deadlocks and ensure proper netpoll operation. The vulnerability does not have any known exploits in the wild and no CVSS score has been assigned yet. It affects specific Linux kernel versions identified by commit hashes, indicating it is a recent and targeted fix in the kernel source code.
Potential Impact
For European organizations, this vulnerability primarily impacts systems running Linux kernels with the affected sungem Ethernet driver, which is common in embedded devices, network appliances, and some server environments. The deadlock and netpoll warnings could lead to network interface instability, degraded network performance, or even system hangs in critical network infrastructure. This can disrupt business operations, especially in sectors relying heavily on stable network connectivity such as telecommunications, finance, healthcare, and critical infrastructure. While the vulnerability does not directly enable remote code execution or privilege escalation, the resulting network deadlocks could cause denial of service conditions, impacting availability. Organizations using Linux-based network devices or embedded systems with the sungem driver should be aware of potential disruptions. Since no exploits are known in the wild, the immediate risk is low, but the presence of deadlocks in network polling mechanisms can complicate troubleshooting and degrade system reliability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should promptly update their Linux kernel to versions where the .ndo_poll_controller callback has been removed from the sungem driver. This involves applying the latest kernel patches or upgrading to a kernel version that includes the fix. For embedded devices or appliances with customized kernels, vendors should be contacted to provide updated firmware or kernel versions. Network administrators should monitor system logs for netpoll warnings related to sungem and investigate any network interface instability or deadlocks. Disabling netpoll on affected interfaces may be a temporary workaround if kernel updates are not immediately feasible, though this could reduce diagnostic capabilities. Additionally, organizations should implement robust network monitoring to detect early signs of network performance degradation. Maintaining an inventory of devices using the sungem driver will help prioritize patching efforts. Since no authentication or user interaction is required to trigger the issue, proactive patch management is critical to avoid potential denial of service scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-38597: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: eth: sungem: remove .ndo_poll_controller to avoid deadlocks Erhard reports netpoll warnings from sungem: netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398) WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c gem_poll_controller() disables interrupts, which may sleep. We can't sleep in netpoll, it has interrupts disabled completely. Strangely, gem_poll_controller() doesn't even poll the completions, and instead acts as if an interrupt has fired so it just schedules NAPI and exits. None of this has been necessary for years, since netpoll invokes NAPI directly.
AI-Powered Analysis
Technical Analysis
CVE-2024-38597 addresses a vulnerability in the Linux kernel's network driver subsystem, specifically related to the 'sungem' Ethernet driver. The issue arises from the presence of the .ndo_poll_controller callback in the sungem driver, which is responsible for polling network device completions. The vulnerability manifests as a deadlock risk due to improper handling of interrupt disabling and sleeping behavior within the netpoll context. Netpoll is a kernel mechanism used for network packet polling, often utilized for debugging and network diagnostics. The problem is that gem_poll_controller() disables interrupts but then performs operations that may sleep, which is forbidden in netpoll since it operates with interrupts fully disabled. Additionally, gem_poll_controller() does not actually poll completions but instead simulates an interrupt by scheduling NAPI (New API) processing and then exits. This behavior is outdated and unnecessary because netpoll now invokes NAPI directly. The presence of .ndo_poll_controller in sungem leads to netpoll warnings and potential deadlocks, which can affect network stability and reliability. The fix involves removing the .ndo_poll_controller callback from the sungem driver to prevent these deadlocks and ensure proper netpoll operation. The vulnerability does not have any known exploits in the wild and no CVSS score has been assigned yet. It affects specific Linux kernel versions identified by commit hashes, indicating it is a recent and targeted fix in the kernel source code.
Potential Impact
For European organizations, this vulnerability primarily impacts systems running Linux kernels with the affected sungem Ethernet driver, which is common in embedded devices, network appliances, and some server environments. The deadlock and netpoll warnings could lead to network interface instability, degraded network performance, or even system hangs in critical network infrastructure. This can disrupt business operations, especially in sectors relying heavily on stable network connectivity such as telecommunications, finance, healthcare, and critical infrastructure. While the vulnerability does not directly enable remote code execution or privilege escalation, the resulting network deadlocks could cause denial of service conditions, impacting availability. Organizations using Linux-based network devices or embedded systems with the sungem driver should be aware of potential disruptions. Since no exploits are known in the wild, the immediate risk is low, but the presence of deadlocks in network polling mechanisms can complicate troubleshooting and degrade system reliability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should promptly update their Linux kernel to versions where the .ndo_poll_controller callback has been removed from the sungem driver. This involves applying the latest kernel patches or upgrading to a kernel version that includes the fix. For embedded devices or appliances with customized kernels, vendors should be contacted to provide updated firmware or kernel versions. Network administrators should monitor system logs for netpoll warnings related to sungem and investigate any network interface instability or deadlocks. Disabling netpoll on affected interfaces may be a temporary workaround if kernel updates are not immediately feasible, though this could reduce diagnostic capabilities. Additionally, organizations should implement robust network monitoring to detect early signs of network performance degradation. Maintaining an inventory of devices using the sungem driver will help prioritize patching efforts. Since no authentication or user interaction is required to trigger the issue, proactive patch management is critical to avoid potential denial of service scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-06-18T19:36:34.932Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe2a8f
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 11:42:07 AM
Last updated: 12/5/2025, 2:14:21 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.