CVE-2024-42294

5.5 MEDIUM

📋 TL;DR

A deadlock vulnerability in the Linux kernel's block subsystem allows concurrent execution of sd_remove and sd_release functions to cause system hangs. This affects Linux systems with SCSI storage devices, potentially leading to denial of service during device removal operations.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but patches available for stable branches.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SCSI storage devices and concurrent device removal operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System becomes completely unresponsive requiring hard reboot, potentially causing data corruption or loss during storage operations.

🟠

Likely Case

System hangs during USB storage device removal or SCSI device operations, requiring manual intervention to recover.

🟢

If Mitigated

Minor performance impact during device removal with proper kernel patching.

🌐 Internet-Facing: LOW - Requires local access or physical device interaction.
🏢 Internal Only: MEDIUM - Can affect servers during storage maintenance or device hot-swapping.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific timing conditions during device removal operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches via provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/5a5625a83eac91fdff1d5f0202ecfc45a31983c9

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Avoid concurrent device operations

linux

Prevent simultaneous device removal and release operations

🧯 If You Can't Patch

  • Avoid hot-plugging SCSI/USB storage devices during active I/O operations
  • Implement monitoring for hung tasks and automate recovery procedures

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with patched versions from kernel git repository

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes commit 5a5625a83eac91fdff1d5f0202ecfc45a31983c9 or related fixes

📡 Detection & Monitoring

Log Indicators:

  • 'blocked for more than' messages in kernel logs
  • Hung task warnings related to sd_remove/sd_release

SIEM Query:

kernel_log: "blocked for more than" AND ("sd_remove" OR "sd_release")

🔗 References

📤 Share & Export