Skip to main content

CVE-2024-40940: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-40940cvecve-2024-40940
Published: Fri Jul 12 2024 (07/12/2024, 12:25:15 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail In case of flow rule creation fail in mlx5_lag_create_port_sel_table(), instead of previously created rules, the tainted pointer is deleted deveral times. Fix this bug by using correct flow rules pointers. Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI-Powered Analysis

AILast updated: 06/29/2025, 02:26:01 UTC

Technical Analysis

CVE-2024-40940 is a vulnerability identified in the Linux kernel, specifically within the mlx5 network driver component that handles Mellanox network devices. The issue arises in the function mlx5_lag_create_port_sel_table(), which is responsible for creating flow rules for network traffic management. When the creation of flow rules fails, the code erroneously deletes a tainted pointer multiple times instead of correctly handling the previously created flow rules pointers. This double or multiple deletion of a tainted pointer can lead to undefined behavior, including potential kernel crashes or memory corruption. The flaw was discovered by the Linux Verification Center using static analysis tools (SVACE). Although no known exploits are currently reported in the wild, the vulnerability affects Linux kernel versions identified by the commit hash 352899f384d4aefa77ede6310d08c1b515612a8f. The vulnerability is technical in nature, involving improper pointer management in kernel space, which could be triggered during network flow rule creation failures in Mellanox network adapters. Since the mlx5 driver is widely used in high-performance networking environments, this bug could impact systems relying on these devices for network traffic control and load balancing.

Potential Impact

For European organizations, the impact of CVE-2024-40940 could be significant in sectors that depend heavily on Linux servers with Mellanox network adapters, such as cloud service providers, data centers, telecommunications, and financial institutions. Exploitation could lead to kernel crashes resulting in denial of service (DoS), potentially disrupting critical services and causing operational downtime. Memory corruption could also open avenues for privilege escalation or arbitrary code execution, although no such exploits are currently known. The vulnerability affects the integrity and availability of affected systems, which could compromise business continuity and data processing reliability. Given the widespread use of Linux in European IT infrastructure, especially in enterprise and cloud environments, unpatched systems could face increased risk of instability or targeted attacks once exploit code becomes available.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2024-40940. Specifically, they should apply patches that correct the pointer handling in the mlx5_lag_create_port_sel_table() function. Network administrators should audit systems using Mellanox mlx5 drivers to identify affected hosts. Where immediate patching is not feasible, organizations can consider temporarily disabling or limiting the use of mlx5-based network interfaces or flow rule creation features to reduce exposure. Monitoring kernel logs for unusual errors related to flow rule creation failures can help detect attempts to trigger the vulnerability. Additionally, implementing strict access controls to limit who can configure network flow rules reduces the risk of exploitation. Coordination with hardware vendors and Linux distribution maintainers is recommended to ensure timely deployment of security updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-12T12:17:45.587Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9827c4522896dcbe1430

Added to database: 5/21/2025, 9:08:55 AM

Last enriched: 6/29/2025, 2:26:01 AM

Last updated: 7/27/2025, 2:38:31 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats