CVE-2024-26931: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix command flush on cable pull System crash due to command failed to flush back to SCSI layer. BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1] SMP NOPTI CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G OE --------- - - 4.18.0-372.9.1.el8.x86_64 #1 Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021 Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc] RIP: 0010:__wake_up_common+0x4c/0x190 Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 <49> 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75 RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000 RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8 R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20 R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: __wake_up_common_lock+0x7c/0xc0 qla_nvme_ls_req+0x355/0x4c0 [qla2xxx] qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0 ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc] qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200. ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc] qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1 ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc] qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0 ? __switch_to+0x10c/0x450 ? process_one_work+0x1a7/0x360 qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201. ? worker_thread+0x1ce/0x390 ? create_worker+0x1a0/0x1a0 qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70 ? kthread+0x10a/0x120 qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8 ? set_kthread_struct+0x40/0x40 qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed. ? ret_from_fork+0x1f/0x40 qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout The system was under memory stress where driver was not able to allocate an SRB to carry out error recovery of cable pull. The failure to flush causes upper layer to start modifying scsi_cmnd. When the system frees up some memory, the subsequent cable pull trigger another command flush. At this point the driver access a null pointer when attempting to DMA unmap the SGL. Add a check to make sure commands are flush back on session tear down to prevent the null pointer access.
AI Analysis
Technical Summary
CVE-2024-26931 is a vulnerability in the Linux kernel's SCSI subsystem, specifically within the qla2xxx driver, which handles QLogic Fibre Channel Host Bus Adapters (HBAs). The flaw arises during error recovery when a cable pull event occurs under memory stress conditions. Normally, when a cable is disconnected, the driver attempts to flush outstanding SCSI commands back to the SCSI layer. However, due to insufficient memory to allocate a SCSI Request Block (SRB) for error recovery, the flush operation fails. This failure leads to the upper layers modifying the scsi_cmnd structure while the driver is still referencing it. When memory becomes available again and another cable pull triggers a command flush, the driver attempts to DMA unmap the Scatter-Gather List (SGL) but accesses a null pointer, causing a kernel NULL pointer dereference and system crash (kernel panic). The vulnerability manifests as a denial-of-service condition due to system instability and crashes. The root cause is a missing check ensuring commands are properly flushed back during session teardown, which has been addressed by adding this validation. The vulnerability affects Linux kernel versions incorporating the qla2xxx driver and is relevant to systems using QLogic Fibre Channel HBAs, commonly found in enterprise storage environments. Exploitation does not require user interaction but depends on physical or logical cable disconnection events combined with memory pressure, making it a complex but impactful issue in affected environments. No CVSS score is assigned yet, and no known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, especially those operating data centers, cloud infrastructure, or enterprise storage systems running Linux with QLogic Fibre Channel HBAs, this vulnerability poses a risk of unexpected system crashes and denial of service. The impact is particularly significant for industries relying on high availability and data integrity, such as finance, telecommunications, healthcare, and government sectors. System crashes can lead to service outages, data access interruptions, and potential data corruption if storage commands are mishandled. Recovery from such crashes may require manual intervention, causing operational delays and increased support costs. Additionally, organizations with strict uptime requirements or those subject to regulatory compliance for data availability could face compliance risks. Although exploitation requires specific conditions (cable pull and memory stress), accidental or malicious triggering (e.g., through physical tampering or induced hardware faults) could disrupt critical services. The vulnerability does not appear to allow privilege escalation or remote code execution but can degrade system reliability and availability.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patches that address CVE-2024-26931 once available from their Linux distribution vendors. Until patched, administrators should monitor systems using qla2xxx drivers for unusual kernel oops or crashes related to SCSI or Fibre Channel events. Implementing proactive hardware monitoring to detect and prevent cable instability or disconnections can reduce the risk of triggering the vulnerability. Memory pressure should be minimized by tuning system resource usage and avoiding overcommitment, especially on storage servers. Employing redundant paths and multipathing for Fibre Channel connections can mitigate the impact of a single cable pull event. Additionally, organizations should review and enhance physical security controls around critical storage infrastructure to prevent unauthorized physical access or tampering. Logging and alerting on kernel errors related to SCSI or qla2xxx can facilitate early detection of attempts to exploit or accidental triggering of this issue. Finally, testing updates in a controlled environment before deployment is recommended to ensure stability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Switzerland
CVE-2024-26931: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix command flush on cable pull System crash due to command failed to flush back to SCSI layer. BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1] SMP NOPTI CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G OE --------- - - 4.18.0-372.9.1.el8.x86_64 #1 Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021 Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc] RIP: 0010:__wake_up_common+0x4c/0x190 Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 <49> 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75 RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000 RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8 R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20 R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: __wake_up_common_lock+0x7c/0xc0 qla_nvme_ls_req+0x355/0x4c0 [qla2xxx] qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0 ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc] qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200. ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc] qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1 ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc] qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0 ? __switch_to+0x10c/0x450 ? process_one_work+0x1a7/0x360 qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201. ? worker_thread+0x1ce/0x390 ? create_worker+0x1a0/0x1a0 qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70 ? kthread+0x10a/0x120 qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8 ? set_kthread_struct+0x40/0x40 qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed. ? ret_from_fork+0x1f/0x40 qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout The system was under memory stress where driver was not able to allocate an SRB to carry out error recovery of cable pull. The failure to flush causes upper layer to start modifying scsi_cmnd. When the system frees up some memory, the subsequent cable pull trigger another command flush. At this point the driver access a null pointer when attempting to DMA unmap the SGL. Add a check to make sure commands are flush back on session tear down to prevent the null pointer access.
AI-Powered Analysis
Technical Analysis
CVE-2024-26931 is a vulnerability in the Linux kernel's SCSI subsystem, specifically within the qla2xxx driver, which handles QLogic Fibre Channel Host Bus Adapters (HBAs). The flaw arises during error recovery when a cable pull event occurs under memory stress conditions. Normally, when a cable is disconnected, the driver attempts to flush outstanding SCSI commands back to the SCSI layer. However, due to insufficient memory to allocate a SCSI Request Block (SRB) for error recovery, the flush operation fails. This failure leads to the upper layers modifying the scsi_cmnd structure while the driver is still referencing it. When memory becomes available again and another cable pull triggers a command flush, the driver attempts to DMA unmap the Scatter-Gather List (SGL) but accesses a null pointer, causing a kernel NULL pointer dereference and system crash (kernel panic). The vulnerability manifests as a denial-of-service condition due to system instability and crashes. The root cause is a missing check ensuring commands are properly flushed back during session teardown, which has been addressed by adding this validation. The vulnerability affects Linux kernel versions incorporating the qla2xxx driver and is relevant to systems using QLogic Fibre Channel HBAs, commonly found in enterprise storage environments. Exploitation does not require user interaction but depends on physical or logical cable disconnection events combined with memory pressure, making it a complex but impactful issue in affected environments. No CVSS score is assigned yet, and no known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, especially those operating data centers, cloud infrastructure, or enterprise storage systems running Linux with QLogic Fibre Channel HBAs, this vulnerability poses a risk of unexpected system crashes and denial of service. The impact is particularly significant for industries relying on high availability and data integrity, such as finance, telecommunications, healthcare, and government sectors. System crashes can lead to service outages, data access interruptions, and potential data corruption if storage commands are mishandled. Recovery from such crashes may require manual intervention, causing operational delays and increased support costs. Additionally, organizations with strict uptime requirements or those subject to regulatory compliance for data availability could face compliance risks. Although exploitation requires specific conditions (cable pull and memory stress), accidental or malicious triggering (e.g., through physical tampering or induced hardware faults) could disrupt critical services. The vulnerability does not appear to allow privilege escalation or remote code execution but can degrade system reliability and availability.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patches that address CVE-2024-26931 once available from their Linux distribution vendors. Until patched, administrators should monitor systems using qla2xxx drivers for unusual kernel oops or crashes related to SCSI or Fibre Channel events. Implementing proactive hardware monitoring to detect and prevent cable instability or disconnections can reduce the risk of triggering the vulnerability. Memory pressure should be minimized by tuning system resource usage and avoiding overcommitment, especially on storage servers. Employing redundant paths and multipathing for Fibre Channel connections can mitigate the impact of a single cable pull event. Additionally, organizations should review and enhance physical security controls around critical storage infrastructure to prevent unauthorized physical access or tampering. Logging and alerting on kernel errors related to SCSI or qla2xxx can facilitate early detection of attempts to exploit or accidental triggering of this issue. Finally, testing updates in a controlled environment before deployment is recommended to ensure stability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.195Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe2e73
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 1:24:40 PM
Last updated: 7/30/2025, 8:55:13 AM
Views: 12
Related Threats
CVE-2025-22834: CWE-665 Improper Initialization in AMI AptioV
MediumCVE-2025-22830: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in AMI AptioV
HighCVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.