CVE-2024-36924
📋 TL;DR
This CVE describes a potential deadlock vulnerability in the Linux kernel's lpfc SCSI driver. If exploited, it could cause system instability or denial of service by locking up the affected driver. Systems using Linux kernels with the vulnerable lpfc driver are affected.
💻 Affected Systems
- Linux kernel with lpfc SCSI driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
System crash or kernel panic requiring reboot, potentially causing data loss or service disruption.
Likely Case
Local denial of service affecting SCSI operations, possibly requiring system reboot to recover.
If Mitigated
Minor performance impact or no effect if the deadlock condition isn't triggered.
🎯 Exploit Status
Exploitation requires local access and specific timing conditions to trigger the deadlock.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing fixes from the provided git commits
Vendor Advisory: https://git.kernel.org/stable/c/6503c39398506cadda9f4c81695a9655ca5fb4fd
Restart Required: Yes
Instructions:
1. Update to a patched kernel version from your distribution vendor. 2. Reboot the system to load the new kernel. 3. Verify the fix is applied by checking kernel version.
🔧 Temporary Workarounds
Disable lpfc module
linuxPrevent loading of the vulnerable lpfc driver if not needed
echo 'blacklist lpfc' >> /etc/modprobe.d/blacklist.conf
rmmod lpfc
🧯 If You Can't Patch
- Monitor systems for kernel panics or SCSI operation failures
- Ensure proper backups and recovery procedures for affected storage systems
🔍 How to Verify
Check if Vulnerable:
Check if lpfc module is loaded: lsmod | grep lpfc AND check kernel version against affected ranges
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated beyond vulnerable versions AND lpfc module loads without issues
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- SCSI operation timeouts
- lpfc driver error messages in dmesg
Network Indicators:
- Storage connectivity issues if using lpfc adapters
SIEM Query:
Search for 'kernel panic' OR 'lpfc' error messages in system logs
🔗 References
- https://git.kernel.org/stable/c/6503c39398506cadda9f4c81695a9655ca5fb4fd
- https://git.kernel.org/stable/c/ded20192dff31c91cef2a04f7e20e60e9bb887d3
- https://git.kernel.org/stable/c/e8bf2c05e8ad68e90f9d5889a9e4ef3f6fe00683
- https://git.kernel.org/stable/c/ee833d7e62de2b84ed1332d501b67f12e7e5678f
- https://git.kernel.org/stable/c/6503c39398506cadda9f4c81695a9655ca5fb4fd
- https://git.kernel.org/stable/c/ded20192dff31c91cef2a04f7e20e60e9bb887d3
- https://git.kernel.org/stable/c/e8bf2c05e8ad68e90f9d5889a9e4ef3f6fe00683
- https://git.kernel.org/stable/c/ee833d7e62de2b84ed1332d501b67f12e7e5678f