CVE-2024-47693
📋 TL;DR
This CVE describes a resource cleanup vulnerability in the Linux kernel's InfiniBand subsystem. When ib_cache_update() fails during device initialization, the system doesn't properly clean up previously allocated GID table resources, leading to a kernel warning and potential resource leaks. This affects systems using InfiniBand or RDMA technologies.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic or system crash due to resource exhaustion if the warning triggers panic-on-warn configurations, potentially causing denial of service.
Likely Case
Kernel warning messages in system logs during InfiniBand device initialization failures, with possible minor resource leaks but no direct exploitation.
If Mitigated
Only kernel warnings in logs with no functional impact if panic-on-warn is disabled.
🎯 Exploit Status
This is an error handling bug, not a traditional security vulnerability. Exploitation would require triggering specific InfiniBand initialization failures.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in Linux kernel stable releases via commits referenced in CVE
Vendor Advisory: https://git.kernel.org/stable/c/1403c8b14765eab805377dd3b75e96ace8747aed
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. For custom kernels, apply the fix from kernel git repository. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable InfiniBand/RDMA if not needed
linuxPrevent the vulnerable code from being loaded by disabling InfiniBand support
modprobe -r ib_core
echo 'blacklist ib_core' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Monitor system logs for kernel warnings related to gid_table_release_one
- Ensure panic-on-warn is disabled (sysctl kernel.panic_on_warn=0)
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if InfiniBand modules are loaded: lsmod | grep ib_
Check Version:
uname -r
Verify Fix Applied:
Check kernel version is patched and monitor dmesg for absence of gid_table_release_one warnings
📡 Detection & Monitoring
Log Indicators:
- Kernel warnings containing 'gid_table_release_one' in dmesg or /var/log/kern.log
Network Indicators:
- None - this is a local kernel issue
SIEM Query:
source="kernel" AND "gid_table_release_one" AND "WARNING"
🔗 References
- https://git.kernel.org/stable/c/1403c8b14765eab805377dd3b75e96ace8747aed
- https://git.kernel.org/stable/c/1730d47d1865af89efd01cf0469a9a739cbf60f2
- https://git.kernel.org/stable/c/290fe42fe0165205c4451334d8833a9202ae1d52
- https://git.kernel.org/stable/c/45f63f4bb9a7128a6209d766c2fc02b3d42fbf3e
- https://git.kernel.org/stable/c/af633fd9d9fff59e31c804f47ca0c8a784977773
- https://git.kernel.org/stable/c/d08754be993f270e3d296d8f5d8e071fe6638651
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html