Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44970: Vulnerability in Linux Linux

0
High
VulnerabilityCVE-2024-44970cvecve-2024-44970
Published: Wed Sep 04 2024 (09/04/2024, 18:56:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink When all the strides in a WQE have been consumed, the WQE is unlinked from the WQ linked list (mlx5_wq_ll_pop()). For SHAMPO, it is possible to receive CQEs with 0 consumed strides for the same WQE even after the WQE is fully consumed and unlinked. This triggers an additional unlink for the same wqe which corrupts the linked list. Fix this scenario by accepting 0 sized consumed strides without unlinking the WQE again.

AI-Powered Analysis

AILast updated: 07/04/2025, 05:12:38 UTC

Technical Analysis

CVE-2024-44970 is a vulnerability identified in the Linux kernel's networking subsystem, specifically within the Mellanox mlx5 Ethernet driver (net/mlx5e). The issue arises in the handling of Work Queue Elements (WQEs) in the SHAMPO (Shared Memory Packet Offload) context. Normally, when all strides (segments) of a WQE have been consumed, the WQE is unlinked from the Work Queue (WQ) linked list via the mlx5_wq_ll_pop() function. However, due to a flaw, it is possible for Completion Queue Entries (CQEs) to be received with zero consumed strides for the same WQE even after it has been fully consumed and unlinked. This results in an additional unlink operation on the same WQE, which corrupts the linked list structure. Such corruption can lead to undefined behavior in the kernel, including potential memory corruption, crashes (kernel panic), or other stability issues. The fix involves modifying the logic to accept zero-sized consumed strides without attempting to unlink the WQE again, thereby preventing the double unlink and linked list corruption. This vulnerability affects certain versions of the Linux kernel containing the vulnerable mlx5e driver code and is relevant to systems using Mellanox network adapters with SHAMPO enabled or in use. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to servers and infrastructure running Linux kernels with Mellanox network adapters, especially in data centers, cloud providers, and enterprises relying on high-performance networking hardware. The linked list corruption can cause kernel crashes leading to denial of service (DoS), potentially disrupting critical services and applications. In environments where high availability is crucial, such as financial institutions, telecommunications, and government infrastructure, such instability can have significant operational and financial consequences. Although no direct remote code execution or privilege escalation is indicated, the kernel instability could be exploited by attackers with local access or through crafted network traffic to cause service outages. This is particularly impactful for organizations using advanced networking features or offloading capabilities provided by Mellanox hardware. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to maintain system integrity and availability.

Mitigation Recommendations

Organizations should promptly identify Linux systems using Mellanox mlx5 network adapters and verify if they run kernel versions containing the vulnerable mlx5e driver code. Applying the official Linux kernel patches that fix CVE-2024-44970 is the primary mitigation step. If immediate patching is not feasible, temporarily disabling SHAMPO or related offload features on affected network interfaces may reduce exposure. Monitoring kernel logs for anomalies or crashes related to mlx5e can help detect exploitation attempts or instability. Network segmentation and strict access controls should be enforced to limit local access to critical systems. Additionally, organizations should maintain updated backups and implement robust incident response plans to quickly recover from potential service disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-21T05:34:56.667Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec033

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 5:12:38 AM

Last updated: 12/2/2025, 11:56:58 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats