CVE-2024-27392

7.8 HIGH

📋 TL;DR

A double-free vulnerability in the Linux kernel's NVMe driver allows attackers to potentially crash the system or execute arbitrary code. This affects systems using NVMe storage devices with vulnerable kernel versions. Attackers with local access can exploit this to cause denial of service or potentially escalate privileges.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (v6.8-rc7 and earlier affected versions)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires NVMe storage devices and the nvme driver to be loaded/used.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential privilege escalation allowing full system compromise.

🟠

Likely Case

System crash or instability when accessing NVMe storage, causing denial of service.

🟢

If Mitigated

Limited to denial of service if exploit fails or system has additional protections like KASAN.

🌐 Internet-Facing: LOW - Requires local access to exploit.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to crash systems or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger the vulnerable code path in ns_update_nuse().

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 534f9dc7fe495b3f9cc84363898ac50c5a25fccb and 8d0d2447394b13fb22a069f0330f9c49b7fff9d3

Vendor Advisory: https://git.kernel.org/stable/c/534f9dc7fe495b3f9cc84363898ac50c5a25fccb

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable NVMe driver

linux

Prevent loading of nvme driver to avoid vulnerability (not recommended for production systems using NVMe storage)

echo 'blacklist nvme' >> /etc/modprobe.d/blacklist-nvme.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local access to systems - implement strict user access controls and monitoring
  • Monitor for system crashes or kernel panics related to NVMe operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if NVMe devices are present: 'uname -r' and 'lsblk' or 'lspci | grep -i nvme'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after fix commits and test NVMe operations work without crashes

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN error reports about double-free
  • System crashes during storage operations

Network Indicators:

  • None - local vulnerability only

SIEM Query:

search 'kernel panic' OR 'KASAN: double-free' OR 'nvme' in system logs

🔗 References

📤 Share & Export