Skip to main content

CVE-2024-44970: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-44970cvecve-2024-44970
Published: Wed Sep 04 2024 (09/04/2024, 18:56:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink When all the strides in a WQE have been consumed, the WQE is unlinked from the WQ linked list (mlx5_wq_ll_pop()). For SHAMPO, it is possible to receive CQEs with 0 consumed strides for the same WQE even after the WQE is fully consumed and unlinked. This triggers an additional unlink for the same wqe which corrupts the linked list. Fix this scenario by accepting 0 sized consumed strides without unlinking the WQE again.

AI-Powered Analysis

AILast updated: 07/04/2025, 05:12:38 UTC

Technical Analysis

CVE-2024-44970 is a vulnerability identified in the Linux kernel's networking subsystem, specifically within the Mellanox mlx5 Ethernet driver (net/mlx5e). The issue arises in the handling of Work Queue Elements (WQEs) in the SHAMPO (Shared Memory Packet Offload) context. Normally, when all strides (segments) of a WQE have been consumed, the WQE is unlinked from the Work Queue (WQ) linked list via the mlx5_wq_ll_pop() function. However, due to a flaw, it is possible for Completion Queue Entries (CQEs) to be received with zero consumed strides for the same WQE even after it has been fully consumed and unlinked. This results in an additional unlink operation on the same WQE, which corrupts the linked list structure. Such corruption can lead to undefined behavior in the kernel, including potential memory corruption, crashes (kernel panic), or other stability issues. The fix involves modifying the logic to accept zero-sized consumed strides without attempting to unlink the WQE again, thereby preventing the double unlink and linked list corruption. This vulnerability affects certain versions of the Linux kernel containing the vulnerable mlx5e driver code and is relevant to systems using Mellanox network adapters with SHAMPO enabled or in use. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to servers and infrastructure running Linux kernels with Mellanox network adapters, especially in data centers, cloud providers, and enterprises relying on high-performance networking hardware. The linked list corruption can cause kernel crashes leading to denial of service (DoS), potentially disrupting critical services and applications. In environments where high availability is crucial, such as financial institutions, telecommunications, and government infrastructure, such instability can have significant operational and financial consequences. Although no direct remote code execution or privilege escalation is indicated, the kernel instability could be exploited by attackers with local access or through crafted network traffic to cause service outages. This is particularly impactful for organizations using advanced networking features or offloading capabilities provided by Mellanox hardware. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to maintain system integrity and availability.

Mitigation Recommendations

Organizations should promptly identify Linux systems using Mellanox mlx5 network adapters and verify if they run kernel versions containing the vulnerable mlx5e driver code. Applying the official Linux kernel patches that fix CVE-2024-44970 is the primary mitigation step. If immediate patching is not feasible, temporarily disabling SHAMPO or related offload features on affected network interfaces may reduce exposure. Monitoring kernel logs for anomalies or crashes related to mlx5e can help detect exploitation attempts or instability. Network segmentation and strict access controls should be enforced to limit local access to critical systems. Additionally, organizations should maintain updated backups and implement robust incident response plans to quickly recover from potential service disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-21T05:34:56.667Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec033

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 5:12:38 AM

Last updated: 8/17/2025, 1:20:25 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats