CVE-2024-50215

7.8 HIGH

📋 TL;DR

This CVE describes a double-free vulnerability in the Linux kernel's NVMe over Fabrics authentication module. The vulnerability occurs when ctrl->dh_key is not properly nullified after being freed, potentially allowing attackers to cause memory corruption and kernel crashes. This affects systems using NVMe over Fabrics with authentication enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific kernel versions containing the vulnerable code (check git commits for exact ranges)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when NVMe over Fabrics authentication is enabled and configured.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially allowing privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System instability, kernel crashes, and denial of service affecting NVMe storage operations.

🟢

If Mitigated

Limited impact if NVMe over Fabrics authentication is disabled or if the system is not using affected kernel versions.

🌐 Internet-Facing: LOW - NVMe over Fabrics typically operates on internal networks and requires authentication.
🏢 Internal Only: MEDIUM - Internal attackers with NVMe authentication access could trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to NVMe authentication functionality and knowledge of triggering the error path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits c60af16e1d6cc2237d58336546d6adfc067b6b8f and related fixes

Vendor Advisory: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable NVMe over Fabrics authentication

linux

Disable authentication for NVMe over Fabrics if not required

# Configure NVMe target without authentication
# Check nvmet configuration files for auth settings

🧯 If You Can't Patch

  • Disable NVMe over Fabrics authentication entirely
  • Restrict access to NVMe management interfaces to trusted users only

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if NVMe authentication is enabled: 'uname -r' and check nvmet configuration

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to patched version and test NVMe authentication functionality

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • NVMe authentication errors in system logs
  • Memory corruption warnings

Network Indicators:

  • Unexpected NVMe authentication failures
  • NVMe connection resets

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "BUG") AND "nvmet"

🔗 References

📤 Share & Export