Skip to main content

CVE-2024-36919: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-36919cvecve-2024-36919
Published: Thu May 30 2024 (05/30/2024, 15:29:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload The session resources are used by FW and driver when session is offloaded, once session is uploaded these resources are not used. The lock is not required as these fields won't be used any longer. The offload and upload calls are sequential, hence lock is not required. This will suppress following BUG_ON(): [ 449.843143] ------------[ cut here ]------------ [ 449.848302] kernel BUG at mm/vmalloc.c:2727! [ 449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI [ 449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1 Rebooting. [ 449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016 [ 449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc] [ 449.882910] RIP: 0010:vunmap+0x2e/0x30 [ 449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 <0f> 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41 [ 449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206 [ 449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005 [ 449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000 [ 449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf [ 449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000 [ 449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0 [ 449.953701] FS: 0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000 [ 449.962732] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0 [ 449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 449.993028] Call Trace: [ 449.995756] __iommu_dma_free+0x96/0x100 [ 450.000139] bnx2fc_free_session_resc+0x67/0x240 [bnx2fc] [ 450.006171] bnx2fc_upload_session+0xce/0x100 [bnx2fc] [ 450.011910] bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc] [ 450.018136] fc_rport_work+0x103/0x5b0 [libfc] [ 450.023103] process_one_work+0x1e8/0x3c0 [ 450.027581] worker_thread+0x50/0x3b0 [ 450.031669] ? rescuer_thread+0x370/0x370 [ 450.036143] kthread+0x149/0x170 [ 450.039744] ? set_kthread_struct+0x40/0x40 [ 450.044411] ret_from_fork+0x22/0x30 [ 450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls [ 450.048497] libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler [ 450.159753] ---[ end trace 712de2c57c64abc8 ]---

AI-Powered Analysis

AILast updated: 06/29/2025, 10:11:05 UTC

Technical Analysis

CVE-2024-36919 is a vulnerability identified in the Linux kernel, specifically within the bnx2fc driver, which is responsible for handling Broadcom NetXtreme II Fibre Channel over Ethernet (FCoE) functionality. The issue arises from the improper use of spin_lock_bh during the release of session resources after the session has been offloaded and uploaded. In the affected code, session resources continue to be locked unnecessarily even after they are no longer in use, leading to a kernel BUG_ON() condition. This manifests as a kernel panic or system crash, as evidenced by the provided kernel trace showing an invalid opcode and a BUG at mm/vmalloc.c. The root cause is that the locking mechanism is redundant because the offload and upload calls are sequential and do not require the spin_lock_bh lock during resource release. The vulnerability can cause system instability and unexpected reboots on affected Linux systems running the vulnerable kernel versions. The problem is specifically triggered during the freeing of DMA memory associated with the bnx2fc session resources. While no known exploits are reported in the wild, the kernel panic can lead to denial of service (DoS) conditions on systems using the bnx2fc driver, particularly those with Broadcom NetXtreme II hardware. The vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and similar builds. No CVSS score is currently assigned, and no patch links are provided in the data, but the issue has been acknowledged and published by the Linux project and CISA. The vulnerability is technical and low-level, impacting kernel stability rather than directly enabling privilege escalation or remote code execution.

Potential Impact

For European organizations, the primary impact of CVE-2024-36919 is the risk of system instability and denial of service on Linux servers utilizing the bnx2fc driver with Broadcom NetXtreme II hardware. This is particularly relevant for data centers, cloud providers, and enterprises relying on Fibre Channel over Ethernet for storage networking. Unexpected kernel panics and reboots can disrupt critical services, leading to downtime, potential data loss during crashes, and operational interruptions. Organizations with high availability requirements or those running storage-intensive workloads on affected hardware may face significant operational risks. Although this vulnerability does not appear to allow remote code execution or privilege escalation, the denial of service impact can be severe in environments where uptime is critical. European sectors such as finance, telecommunications, healthcare, and government, which often deploy Linux-based infrastructure with advanced storage networking, could be affected. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or triggered crashes, which could be exploited indirectly by attackers aiming to disrupt services.

Mitigation Recommendations

To mitigate CVE-2024-36919, European organizations should: 1) Identify Linux systems running kernels with the vulnerable bnx2fc driver version (notably those matching or derived from commit 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2). 2) Apply the official Linux kernel patches or updates that remove the unnecessary spin_lock_bh usage in the bnx2fc driver as soon as they become available from trusted Linux distribution vendors or the Linux kernel mainline. 3) If immediate patching is not possible, consider disabling the bnx2fc driver or the use of Broadcom NetXtreme II FCoE functionality temporarily to prevent triggering the bug, understanding this may impact storage connectivity. 4) Monitor system logs for kernel BUG_ON() messages or unexpected reboots related to bnx2fc activity to detect potential triggering of the vulnerability. 5) Implement robust backup and recovery procedures to minimize data loss risk from unexpected crashes. 6) Coordinate with hardware vendors for firmware updates or configuration guidance that may mitigate risk. 7) For environments using virtualization or containerization, isolate affected workloads to reduce impact scope. These steps go beyond generic advice by focusing on driver-specific identification, temporary workarounds, and operational monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-30T15:25:07.068Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe26a9

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 10:11:05 AM

Last updated: 8/2/2025, 12:34:24 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats