Skip to main content

CVE-2024-53229: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-53229cvecve-2024-53229
Published: Fri Dec 27 2024 (12/27/2024, 13:50:17 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the qp flush warnings in req When the qp is in error state, the status of WQEs in the queue should be set to error. Or else the following will appear. [ 920.617269] WARNING: CPU: 1 PID: 21 at drivers/infiniband/sw/rxe/rxe_comp.c:756 rxe_completer+0x989/0xcc0 [rdma_rxe] [ 920.617744] Modules linked in: rnbd_client(O) rtrs_client(O) rtrs_core(O) rdma_ucm rdma_cm iw_cm ib_cm crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel ib_uverbs ib_core loop brd null_blk ipv6 [ 920.618516] CPU: 1 PID: 21 Comm: ksoftirqd/1 Tainted: G O 6.1.113-storage+ #65 [ 920.618986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 [ 920.619396] RIP: 0010:rxe_completer+0x989/0xcc0 [rdma_rxe] [ 920.619658] Code: 0f b6 84 24 3a 02 00 00 41 89 84 24 44 04 00 00 e9 2a f7 ff ff 39 ca bb 03 00 00 00 b8 0e 00 00 00 48 0f 45 d8 e9 15 f7 ff ff <0f> 0b e9 cb f8 ff ff 41 bf f5 ff ff ff e9 08 f8 ff ff 49 8d bc 24 [ 920.620482] RSP: 0018:ffff97b7c00bbc38 EFLAGS: 00010246 [ 920.620817] RAX: 0000000000000000 RBX: 000000000000000c RCX: 0000000000000008 [ 920.621183] RDX: ffff960dc396ebc0 RSI: 0000000000005400 RDI: ffff960dc4e2fbac [ 920.621548] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffac406450 [ 920.621884] R10: ffffffffac4060c0 R11: 0000000000000001 R12: ffff960dc4e2f800 [ 920.622254] R13: ffff960dc4e2f928 R14: ffff97b7c029c580 R15: 0000000000000000 [ 920.622609] FS: 0000000000000000(0000) GS:ffff960ef7d00000(0000) knlGS:0000000000000000 [ 920.622979] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 920.623245] CR2: 00007fa056965e90 CR3: 00000001107f1000 CR4: 00000000000006e0 [ 920.623680] Call Trace: [ 920.623815] <TASK> [ 920.623933] ? __warn+0x79/0xc0 [ 920.624116] ? rxe_completer+0x989/0xcc0 [rdma_rxe] [ 920.624356] ? report_bug+0xfb/0x150 [ 920.624594] ? handle_bug+0x3c/0x60 [ 920.624796] ? exc_invalid_op+0x14/0x70 [ 920.624976] ? asm_exc_invalid_op+0x16/0x20 [ 920.625203] ? rxe_completer+0x989/0xcc0 [rdma_rxe] [ 920.625474] ? rxe_completer+0x329/0xcc0 [rdma_rxe] [ 920.625749] rxe_do_task+0x80/0x110 [rdma_rxe] [ 920.626037] rxe_requester+0x625/0xde0 [rdma_rxe] [ 920.626310] ? rxe_cq_post+0xe2/0x180 [rdma_rxe] [ 920.626583] ? do_complete+0x18d/0x220 [rdma_rxe] [ 920.626812] ? rxe_completer+0x1a3/0xcc0 [rdma_rxe] [ 920.627050] rxe_do_task+0x80/0x110 [rdma_rxe] [ 920.627285] tasklet_action_common.constprop.0+0xa4/0x120 [ 920.627522] handle_softirqs+0xc2/0x250 [ 920.627728] ? sort_range+0x20/0x20 [ 920.627942] run_ksoftirqd+0x1f/0x30 [ 920.628158] smpboot_thread_fn+0xc7/0x1b0 [ 920.628334] kthread+0xd6/0x100 [ 920.628504] ? kthread_complete_and_exit+0x20/0x20 [ 920.628709] ret_from_fork+0x1f/0x30 [ 920.628892] </TASK>

AI-Powered Analysis

AILast updated: 06/28/2025, 10:56:50 UTC

Technical Analysis

CVE-2024-53229 is a vulnerability identified in the Linux kernel specifically within the RDMA (Remote Direct Memory Access) subsystem, more precisely in the rxe (RDMA over Ethernet) driver component. The issue arises when a Queue Pair (QP) enters an error state but the status of Work Queue Elements (WQEs) in the queue is not properly set to error. This improper handling leads to kernel warnings and potentially unstable behavior as indicated by the kernel logs showing warnings and call traces related to the rxe_completer function. The vulnerability is rooted in the failure to correctly flush or mark WQEs as erroneous when the QP is in an error state, which can cause unexpected kernel warnings and may lead to undefined behavior in the RDMA driver. Although the detailed exploitability is not described and no known exploits are reported in the wild, the presence of kernel warnings and potential instability in a critical kernel subsystem like RDMA could lead to denial of service conditions or system crashes if triggered. The vulnerability affects specific Linux kernel versions identified by commit hashes, and it has been addressed by fixing the QP flush warnings in the rxe driver to ensure proper error status propagation for WQEs. This vulnerability does not have an assigned CVSS score yet, and no authentication or user interaction details are provided, but it is a kernel-level issue affecting a subsystem used primarily in high-performance computing and data center environments that utilize RDMA for low-latency networking.

Potential Impact

For European organizations, especially those operating data centers, cloud infrastructure, or high-performance computing clusters that rely on Linux servers with RDMA capabilities, this vulnerability could impact system stability and availability. RDMA is commonly used in environments requiring fast data transfer such as financial services, research institutions, and telecommunications. If exploited or triggered, the vulnerability could cause kernel warnings leading to degraded performance or kernel panics, resulting in denial of service. Although no direct remote code execution or privilege escalation is indicated, the disruption of RDMA services could affect critical applications relying on low-latency networking. This could impact sectors like banking, scientific research, and cloud service providers in Europe, where Linux-based RDMA-enabled infrastructure is prevalent. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the flaw.

Mitigation Recommendations

European organizations should prioritize updating Linux kernel versions to those containing the fix for CVE-2024-53229. Since the vulnerability is in the rxe RDMA driver, organizations using RDMA over Ethernet should audit their systems to identify affected kernel versions and apply patches promptly. Kernel upgrades should be tested in staging environments to ensure compatibility with existing RDMA workloads. Additionally, monitoring kernel logs for the specific warning messages related to rxe_completer can help detect attempts to trigger the vulnerability or system instability. Network segmentation and limiting access to RDMA-enabled nodes can reduce exposure. For environments where immediate patching is not feasible, disabling the rxe driver or RDMA over Ethernet functionality temporarily can mitigate risk, though this may impact performance. Finally, maintaining an up-to-date inventory of Linux kernel versions and RDMA usage across infrastructure will facilitate rapid response to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:25.025Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdf016

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 10:56:50 AM

Last updated: 8/6/2025, 12:33:39 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats