CVE-2024-47695
📋 TL;DR
This CVE describes an out-of-bounds memory access vulnerability in the Linux kernel's RDMA/rtrs-clt subsystem. The flaw occurs during connection cleanup when a failure happens, allowing potential memory corruption. Systems running affected Linux kernel versions with RDMA functionality are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic, system crash, or potential privilege escalation leading to full system compromise.
Likely Case
System instability, crashes, or denial of service affecting RDMA functionality.
If Mitigated
Limited impact if RDMA is disabled or not in use, with potential for system instability if triggered.
🎯 Exploit Status
Exploitation requires triggering the specific failure condition in init_conns() function and may require local access or network access to RDMA services.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commit 01b9be936ee8839ab9f83a7e84ee02ac6c8303c4 or later
Vendor Advisory: https://git.kernel.org/stable/c/01b9be936ee8839ab9f83a7e84ee02ac6c8303c4
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable RDMA functionality
linuxDisable RDMA modules to prevent exploitation
modprobe -r rdma_rtrs_client
echo 'blacklist rdma_rtrs_client' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Disable RDMA functionality if not required
- Restrict access to RDMA services using firewall rules
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if RDMA modules are loaded: lsmod | grep rtrs
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched and RDMA modules function correctly after update
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- RDMA connection failure messages
- Out-of-bounds memory access errors
Network Indicators:
- Unexpected RDMA connection failures
- Abnormal RDMA traffic patterns
SIEM Query:
kernel:panic OR kernel:oops OR rdma:error
🔗 References
- https://git.kernel.org/stable/c/01b9be936ee8839ab9f83a7e84ee02ac6c8303c4
- https://git.kernel.org/stable/c/0429a4e972082e3a2351da414b1c017daaf8aed2
- https://git.kernel.org/stable/c/1c50e0265fa332c94a4a182e4efa0fc70d8fad94
- https://git.kernel.org/stable/c/3e4289b29e216a55d08a89e126bc0b37cbad9f38
- https://git.kernel.org/stable/c/5ac73f8191f3de41fef4f934d84d97f3aadb301f
- https://git.kernel.org/stable/c/c8b7f3d9fada0d4b4b7db86bf7345cd61f1d972e
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html