CVE-2024-36025
📋 TL;DR
This CVE describes an off-by-one buffer overflow vulnerability in the qla2xxx SCSI driver in the Linux kernel. An attacker with local access could potentially corrupt kernel memory, leading to system instability or privilege escalation. Systems using QLogic Fibre Channel adapters with the affected driver are vulnerable.
💻 Affected Systems
- Linux kernel with qla2xxx driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation leading to full system compromise, kernel panic causing denial of service, or arbitrary code execution in kernel context.
Likely Case
System crash or instability due to kernel memory corruption, potentially requiring system reboot.
If Mitigated
Limited impact if proper access controls prevent local attackers from accessing the vulnerable interface.
🎯 Exploit Status
Requires local access and knowledge of the vulnerable interface. The off-by-one nature makes exploitation less straightforward than typical buffer overflows.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel with commits 4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd or later
Vendor Advisory: https://git.kernel.org/stable/c/4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable qla2xxx driver
linuxRemove or blacklist the vulnerable driver if QLogic adapters are not needed
echo 'blacklist qla2xxx' >> /etc/modprobe.d/blacklist.conf
rmmod qla2xxx
Restrict access to SCSI interfaces
linuxUse kernel security modules to restrict access to vulnerable SCSI interfaces
# Configure SELinux/AppArmor policies to restrict access to /dev/sg* devices
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized local users from accessing the system
- Monitor system logs for kernel panics or unusual SCSI driver activity
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if qla2xxx module is loaded: lsmod | grep qla2xxx && uname -r
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and check git commit history for the fix: grep -r 'qla_edif_app_getstats' /proc/kallsyms
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- System crashes/panics
- SCSI driver error messages in dmesg
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
source="kernel" AND ("qla2xxx" OR "SCSI" OR "kernel panic")
🔗 References
- https://git.kernel.org/stable/c/4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd
- https://git.kernel.org/stable/c/60b87b5ecbe07d70897d35947b0bb3e76ccd1b3a
- https://git.kernel.org/stable/c/8c820f7c8e9b46238d277c575392fe9930207aab
- https://git.kernel.org/stable/c/9fc74e367be4247a5ac39bb8ec41eaa73fade510
- https://git.kernel.org/stable/c/ea8ac95c22c93acecb710209a7fd10b851afe817
- https://git.kernel.org/stable/c/4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd
- https://git.kernel.org/stable/c/60b87b5ecbe07d70897d35947b0bb3e76ccd1b3a
- https://git.kernel.org/stable/c/8c820f7c8e9b46238d277c575392fe9930207aab
- https://git.kernel.org/stable/c/9fc74e367be4247a5ac39bb8ec41eaa73fade510
- https://git.kernel.org/stable/c/ea8ac95c22c93acecb710209a7fd10b851afe817