CVE-2024-53162

7.1 HIGH

📋 TL;DR

This CVE-2024-53162 is an off-by-one buffer read vulnerability in the Linux kernel's QAT (QuickAssist Technology) cryptographic driver. It allows attackers to read kernel memory beyond the allocated buffer, potentially exposing sensitive information. Systems using affected Linux kernel versions with QAT 4xxx hardware acceleration are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with QAT 4xxx driver
Versions: Specific kernel versions containing the vulnerable commit before fixes were applied
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel QAT 4xxx hardware acceleration enabled and the vulnerable driver loaded.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure leading to information leakage, potential privilege escalation if combined with other vulnerabilities, or system instability/crashes.

🟠

Likely Case

Information disclosure of kernel memory contents, potentially exposing cryptographic keys or other sensitive data from adjacent memory regions.

🟢

If Mitigated

Limited impact with proper kernel hardening, address space layout randomization (KASLR), and memory protection mechanisms in place.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger the vulnerable code path through other means.
🏢 Internal Only: MEDIUM - Local attackers or compromised users could exploit this to gain kernel memory information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger the vulnerable uof_get_name() function in the QAT driver.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits 05c9a7a53444, 475b5098043e, 700852528fc5, or e69d2845aaa0

Vendor Advisory: https://git.kernel.org/stable/c/05c9a7a5344425860202a8f3efea4d8ed2d10edb

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Rebuild kernel if compiling from source. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable QAT driver

linux

Unload or blacklist the vulnerable QAT driver module

sudo rmmod qat_4xxx
echo 'blacklist qat_4xxx' | sudo tee /etc/modprobe.d/blacklist-qat.conf

🧯 If You Can't Patch

  • Disable QAT hardware acceleration if not required
  • Implement strict access controls to prevent unauthorized local users from accessing system

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if QAT driver is loaded: lsmod | grep qat_4xxx

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits and QAT driver loads without errors

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • QAT driver error logs
  • System crashes when using cryptographic functions

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for kernel panic logs or QAT driver error messages in system logs

🔗 References

📤 Share & Export