CVE-2024-41073
📋 TL;DR
This CVE describes a double-free vulnerability in the Linux kernel's NVMe driver that occurs when discard requests are retried. If exploited, it could lead to kernel memory corruption, potentially causing system crashes or privilege escalation. This affects all Linux systems using NVMe storage devices with the vulnerable kernel version.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to denial of service, or potential privilege escalation allowing attackers to gain root access and execute arbitrary code.
Likely Case
System instability, crashes, or denial of service affecting NVMe storage operations.
If Mitigated
Limited impact with proper kernel hardening and isolation; crashes contained to affected storage operations.
🎯 Exploit Status
Requires ability to trigger NVMe discard operations; likely requires local access or compromised process.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 1b9fd1265fac85916f90b4648de02adccdb7220b, 882574942a9be8b9d70d13462ddacc80c4b385ba, ae84383c96d6662c24697ab6b44aae855ab670aa, c5942a14f795de957ae9d66027aac8ff4fe70057, e5d574ab37f5f2e7937405613d9b1a724811e5ad
Vendor Advisory: https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable NVMe discard operations
linuxPrevent discard operations on NVMe devices to avoid triggering the vulnerability
echo 0 > /sys/block/nvme*/queue/discard_max_bytes
echo 0 > /sys/block/nvme*/queue/discard_granularity
🧯 If You Can't Patch
- Restrict access to NVMe devices to trusted users only
- Implement strict process isolation and limit NVMe operations to essential services
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with patched versions from git commits; examine if NVMe devices are present
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits; test NVMe discard operations for stability
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- NVMe driver errors in dmesg
- System crashes during storage operations
Network Indicators:
- None - local vulnerability
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "BUG") AND ("nvme" OR "discard")
🔗 References
- https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b
- https://git.kernel.org/stable/c/882574942a9be8b9d70d13462ddacc80c4b385ba
- https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa
- https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057
- https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad
- https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b
- https://git.kernel.org/stable/c/1b9fd1265fac85916f90b4648de02adccdb7220b
- https://git.kernel.org/stable/c/ae84383c96d6662c24697ab6b44aae855ab670aa
- https://git.kernel.org/stable/c/c5942a14f795de957ae9d66027aac8ff4fe70057
- https://git.kernel.org/stable/c/e5d574ab37f5f2e7937405613d9b1a724811e5ad
- https://git.kernel.org/stable/c/f3ab45aacd25d957547fb6d115c1574c20964b3b
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html