Skip to main content

CVE-2024-47730: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-47730cvecve-2024-47730
Published: Mon Oct 21 2024 (10/21/2024, 12:14:02 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - inject error before stopping queue The master ooo cannot be completely closed when the accelerator core reports memory error. Therefore, the driver needs to inject the qm error to close the master ooo. Currently, the qm error is injected after stopping queue, memory may be released immediately after stopping queue, causing the device to access the released memory. Therefore, error is injected to close master ooo before stopping queue to ensure that the device does not access the released memory.

AI-Powered Analysis

AILast updated: 06/28/2025, 20:10:41 UTC

Technical Analysis

CVE-2024-47730 is a vulnerability identified in the Linux kernel, specifically within the crypto subsystem related to the Hisilicon QM (Queue Manager) driver. The issue arises from improper handling of error injection timing when the accelerator core reports a memory error. The vulnerability is due to the sequence in which the QM error is injected relative to stopping the queue. Currently, the error is injected after the queue is stopped, which can lead to a race condition where memory is released immediately after stopping the queue. This premature release allows the device to potentially access freed memory, causing use-after-free conditions or memory corruption. The fix involves injecting the QM error before stopping the queue, ensuring that the master out-of-order (ooo) queue is properly closed and preventing the device from accessing released memory. This vulnerability is technical and low-level, affecting the kernel driver responsible for hardware acceleration on systems using Hisilicon components. The affected versions are identified by specific commit hashes, indicating that this is a recent and targeted fix. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability could lead to system instability, potential denial of service, or in some cases, could be leveraged for privilege escalation or arbitrary code execution if exploited in a complex attack chain, given the kernel-level impact and memory corruption potential.

Potential Impact

For European organizations, the impact of CVE-2024-47730 depends largely on the deployment of Linux systems utilizing Hisilicon hardware accelerators, which are commonly found in telecom infrastructure, cloud data centers, and specialized computing environments. If exploited, this vulnerability could cause kernel crashes or memory corruption, leading to denial of service conditions that disrupt critical services. In high-availability environments such as financial institutions, telecommunications providers, and government agencies, such disruptions could have significant operational and reputational consequences. Additionally, if attackers develop sophisticated exploits, there is a risk of privilege escalation or unauthorized code execution at the kernel level, which could compromise confidentiality and integrity of sensitive data. Given the kernel-level nature of the vulnerability, the scope of impact could be broad on affected systems, potentially affecting multiple services running on the same host. European organizations relying on Linux-based infrastructure with Hisilicon components should consider this vulnerability a serious risk to system stability and security.

Mitigation Recommendations

To mitigate CVE-2024-47730, European organizations should take the following specific actions: 1) Identify all Linux systems running kernels with the affected Hisilicon QM driver, focusing on those using hardware accelerators from Hisilicon. 2) Apply the latest Linux kernel patches or updates that include the fix for this vulnerability as soon as they become available from trusted Linux distributions or kernel maintainers. 3) For environments where immediate patching is not feasible, consider temporarily disabling the Hisilicon QM driver or hardware acceleration features if possible, to prevent exploitation. 4) Monitor system logs and kernel messages for signs of memory errors or unusual queue management behavior that could indicate attempts to exploit this vulnerability. 5) Implement strict access controls and limit administrative privileges to reduce the risk of local exploitation. 6) Engage with hardware and software vendors to confirm the presence of patched versions and receive guidance on secure configurations. 7) Incorporate this vulnerability into vulnerability management and incident response plans to ensure rapid detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-30T16:00:12.957Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0607

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 8:10:41 PM

Last updated: 8/12/2025, 7:43:09 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats