Skip to main content

CVE-2024-42145: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-42145cvecve-2024-42145
Published: Tue Jul 30 2024 (07/30/2024, 07:46:38 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: IB/core: Implement a limit on UMAD receive List The existing behavior of ib_umad, which maintains received MAD packets in an unbounded list, poses a risk of uncontrolled growth. As user-space applications extract packets from this list, the rate of extraction may not match the rate of incoming packets, leading to potential list overflow. To address this, we introduce a limit to the size of the list. After considering typical scenarios, such as OpenSM processing, which can handle approximately 100k packets per second, and the 1-second retry timeout for most packets, we set the list size limit to 200k. Packets received beyond this limit are dropped, assuming they are likely timed out by the time they are handled by user-space. Notably, packets queued on the receive list due to reasons like timed-out sends are preserved even when the list is full.

AI-Powered Analysis

AILast updated: 06/29/2025, 05:41:05 UTC

Technical Analysis

CVE-2024-42145 addresses a vulnerability in the Linux kernel's InfiniBand (IB) core subsystem, specifically in the handling of User MAD (Management Datagram) packets via the ib_umad interface. The vulnerability stems from the unbounded growth of the receive list that stores incoming MAD packets. In the existing implementation, the ib_umad subsystem maintains a list of received MAD packets without any upper limit on its size. This design flaw can lead to uncontrolled memory consumption if the rate at which user-space applications extract packets from this list does not keep pace with the incoming packet rate. Such a scenario can cause the receive list to grow indefinitely, potentially leading to resource exhaustion and denial of service (DoS) conditions on affected Linux systems. To mitigate this, the Linux kernel developers introduced a limit on the size of the receive list. The limit is set to 200,000 packets, based on typical operational scenarios such as OpenSM (Open Subnet Manager) processing capabilities and packet retry timeouts. When the list reaches this threshold, additional incoming packets are dropped, under the assumption that these packets would likely have timed out by the time they could be processed by user-space applications. Importantly, packets that are queued due to reasons like timed-out sends are preserved even when the list is full, ensuring that critical packet handling is not disrupted. This fix prevents the unbounded growth of the receive list, thereby mitigating the risk of resource exhaustion and improving the stability and reliability of the IB core subsystem in Linux kernels. No known exploits are reported in the wild at the time of publication, and the vulnerability does not have an assigned CVSS score yet.

Potential Impact

For European organizations, the impact of CVE-2024-42145 primarily concerns systems that utilize Linux kernels with InfiniBand hardware and software stacks, commonly found in high-performance computing (HPC) environments, data centers, and research institutions. InfiniBand is widely used in scientific research, financial services, and large-scale enterprise environments where low-latency and high-throughput networking is critical. If exploited or triggered unintentionally, the vulnerability could lead to denial of service conditions due to memory exhaustion on affected Linux hosts, potentially disrupting critical HPC workloads or data center operations. This could result in downtime, loss of productivity, and increased operational costs. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can be significant in environments relying on InfiniBand for mission-critical applications. European organizations with HPC clusters, research labs, or financial institutions using InfiniBand-enabled Linux systems should be particularly vigilant. The absence of known exploits reduces immediate risk, but the potential for DoS conditions warrants prompt attention to patching and mitigation.

Mitigation Recommendations

1. Apply the Linux kernel patch that introduces the receive list size limit for ib_umad as soon as it becomes available from your Linux distribution or kernel vendor. 2. Monitor InfiniBand subsystem logs and performance metrics to detect unusual growth in the receive list or packet drops, which could indicate attempts to trigger the vulnerability or operational issues. 3. Implement rate limiting or traffic shaping at the network level to control the volume of MAD packets sent to hosts, reducing the risk of overwhelming the receive list. 4. Regularly update and maintain InfiniBand firmware and drivers to ensure compatibility with kernel patches and overall system stability. 5. For critical HPC or data center environments, consider deploying redundancy and failover mechanisms to minimize service disruption in case of DoS conditions. 6. Educate system administrators and security teams about this vulnerability and incorporate checks into routine security audits and incident response plans. These steps go beyond generic advice by focusing on monitoring, network-level controls, and operational best practices specific to InfiniBand environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-29T15:50:41.190Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9827c4522896dcbe1b97

Added to database: 5/21/2025, 9:08:55 AM

Last enriched: 6/29/2025, 5:41:05 AM

Last updated: 8/16/2025, 3:19:42 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats