CVE-2024-56748

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's QLogic FastLinQ 4xxxx Ethernet Driver (qedf). When the qed_sb_init function fails during system buffer allocation, it doesn't properly release DMA memory, potentially leading to resource exhaustion. This affects systems using QLogic FastLinQ 4xxxx Ethernet adapters with the vulnerable driver.

💻 Affected Systems

Products:
  • Linux kernel with QLogic FastLinQ 4xxxx Ethernet Driver (qedf)
Versions: Linux kernel versions containing the vulnerable qedf driver code prior to the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with QLogic FastLinQ 4xxxx Ethernet adapters and the qedf driver loaded.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could repeatedly trigger the failure condition to exhaust system memory, leading to denial of service, system instability, or kernel panic.

🟠

Likely Case

System instability or performance degradation due to memory exhaustion over time, potentially requiring system reboot.

🟢

If Mitigated

Minimal impact with proper memory monitoring and system hardening in place.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific driver operations.
🏢 Internal Only: MEDIUM - Could be exploited by malicious local users or through other vulnerabilities to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific driver failure conditions, typically requiring local access or ability to influence driver operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing commits 0e04bd5a11dffe8c1c0e4c9fc79f7d3cd6182dd5 or later

Vendor Advisory: https://git.kernel.org/stable/c/0e04bd5a11dffe8c1c0e4c9fc79f7d3cd6182dd5

Restart Required: Yes

Instructions:

1. Update to a patched Linux kernel version. 2. Rebuild kernel if using custom kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Unload qedf driver

linux

Temporarily disable the vulnerable driver if QLogic adapter is not required

sudo modprobe -r qedf

Blacklist qedf driver

linux

Prevent qedf driver from loading at boot

echo 'blacklist qedf' | sudo tee /etc/modprobe.d/blacklist-qedf.conf
sudo update-initramfs -u

🧯 If You Can't Patch

  • Implement strict memory usage monitoring and alerts for systems using qedf driver
  • Restrict local user access to systems with vulnerable driver loaded

🔍 How to Verify

Check if Vulnerable:

Check if qedf driver is loaded: lsmod | grep qedf. If loaded, check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: uname -r and check git commit history. Confirm qedf driver loads without issues.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages related to qedf driver
  • Memory allocation failures in kernel logs
  • System instability or crash reports

Network Indicators:

  • Degraded network performance on QLogic interfaces
  • Interface failures on systems with qedf driver

SIEM Query:

source="kernel" AND ("qedf" OR "DMA allocation failed" OR "out of memory")

🔗 References

📤 Share & Export