CVE-2024-36476
📋 TL;DR
This CVE-2024-36476 is a NULL pointer dereference vulnerability in the Linux kernel's RDMA/rtrs subsystem. It can cause kernel panics and system crashes when the 'ib_sge list' variable becomes inaccessible due to improper scoping. Systems using RDMA (Remote Direct Memory Access) with the rtrs driver are affected.
💻 Affected Systems
- Linux kernel with RDMA/rtrs subsystem enabled
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.
Likely Case
System crash or kernel panic when RDMA operations trigger the vulnerable code path, resulting in temporary service unavailability.
If Mitigated
Minimal impact if systems have proper monitoring and redundancy, with crashes being recoverable through reboots.
🎯 Exploit Status
Exploitation requires triggering specific RDMA operations. The vulnerability was discovered through crash reports, not active exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions with commits: 143378075904e78b3b2a810099bcc3b3d82d762f, 32e1e748a85bd52b20b3857d80fd166d22fa455a, 6ffb5c1885195ae5211a12b4acd2d51843ca41b0, 7eaa71f56a6f7ab87957213472dc6d4055862722, b238f61cc394d5fef27b26d7d9aa383ebfddabb0
Vendor Advisory: https://git.kernel.org/stable/c/143378075904e78b3b2a810099bcc3b3d82d762f
Restart Required: Yes
Instructions:
1. Update to a patched kernel version from your distribution vendor. 2. Rebuild kernel if using custom kernel. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable RDMA/rtrs module
linuxPrevent loading of the vulnerable RDMA rtrs module if not required
echo 'blacklist rtrs' >> /etc/modprobe.d/blacklist.conf
rmmod rtrs
🧯 If You Can't Patch
- Disable RDMA functionality if not essential for operations
- Implement system monitoring for kernel panics and have rapid recovery procedures
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if RDMA/rtrs is loaded: 'uname -r' and 'lsmod | grep rtrs'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched and check for absence of NULL pointer dereference errors in dmesg
📡 Detection & Monitoring
Log Indicators:
- Kernel NULL pointer dereference errors in dmesg
- System crash logs mentioning rxe_mr_copy or rtrs
Network Indicators:
- Unexpected RDMA connection failures
SIEM Query:
Search for 'kernel: BUG: kernel NULL pointer dereference' or 'rxe_mr_copy' in system logs
🔗 References
- https://git.kernel.org/stable/c/143378075904e78b3b2a810099bcc3b3d82d762f
- https://git.kernel.org/stable/c/32e1e748a85bd52b20b3857d80fd166d22fa455a
- https://git.kernel.org/stable/c/6ffb5c1885195ae5211a12b4acd2d51843ca41b0
- https://git.kernel.org/stable/c/7eaa71f56a6f7ab87957213472dc6d4055862722
- https://git.kernel.org/stable/c/b238f61cc394d5fef27b26d7d9aa383ebfddabb0
- https://git.kernel.org/stable/c/fb514b31395946022f13a08e06a435f53cf9e8b3
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html