CVE-2024-36952: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up There are cases after NPIV deletion where the fabric switch still believes the NPIV is logged into the fabric. This occurs when a vport is unregistered before the Remove All DA_ID CT and LOGO ELS are sent to the fabric. Currently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including the fabric D_ID, removes the last ndlp reference and frees the ndlp rport object. This sometimes causes the race condition where the final DA_ID and LOGO are skipped from being sent to the fabric switch. Fix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID and LOGO are sent.
AI Analysis
Technical Summary
CVE-2024-36952 is a vulnerability identified in the Linux kernel's SCSI subsystem, specifically related to the lpfc (LightPulse Fibre Channel) driver handling NPIV (N_Port ID Virtualization) transport unregistration. NPIV allows multiple virtual ports (vports) to share a single physical Fibre Channel port, enabling virtualization of storage area network (SAN) resources. The vulnerability arises due to a race condition during the unregistration process of NPIV vports. When a vport is unregistered, the Linux kernel calls fc_remove_host(), which in turn calls dev_loss_tmo for all destination IDs (D_IDs), including the fabric D_ID. This call removes the last reference to the node list data pointer (ndlp) and frees the associated remote port (rport) object. However, this premature freeing can cause the final DA_ID (Delete All IDs) and LOGO (Logout) Extended Link Service (ELS) commands, which notify the fabric switch of the vport's removal, to be skipped. As a result, the fabric switch may erroneously believe that the NPIV vport remains logged into the fabric, potentially leading to stale or inconsistent state information on the SAN fabric. The fix involves reordering the calls so that fc_remove_host() and scsi_remove_host() are invoked only after the DA_ID and LOGO ELS commands have been successfully sent to the fabric switch, ensuring proper cleanup and synchronization between the host and the fabric. This vulnerability is specific to Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and affects environments using the lpfc driver with NPIV enabled. No known exploits are reported in the wild as of the publication date (May 30, 2024).
Potential Impact
The impact of CVE-2024-36952 primarily concerns the integrity and availability of Fibre Channel SAN environments running on Linux systems with the lpfc driver and NPIV enabled. If the fabric switch retains stale NPIV login states due to skipped DA_ID and LOGO commands, it may lead to resource leaks, misrouting of storage traffic, or denial of service conditions on the SAN fabric. For European organizations relying on Linux-based SAN infrastructure for critical storage operations—such as financial institutions, healthcare providers, and large enterprises—this could result in degraded storage performance, increased operational complexity, or temporary loss of access to storage resources. Although this vulnerability does not directly expose confidentiality risks or allow remote code execution, the resulting SAN fabric inconsistencies could disrupt business continuity and complicate incident response. The absence of known exploits reduces immediate risk, but the complexity of SAN environments and the critical nature of storage systems in Europe amplify the importance of timely patching and monitoring.
Mitigation Recommendations
To mitigate CVE-2024-36952, European organizations should: 1) Apply the official Linux kernel patches that reorder the unregistration sequence to ensure DA_ID and LOGO ELS commands are sent before resource cleanup. This requires updating to a kernel version that includes the fix identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 or later. 2) Conduct thorough testing of SAN environments after patching to verify that NPIV vport removal behaves correctly and that fabric switches reflect accurate login states. 3) Implement monitoring on SAN fabric switches to detect stale NPIV sessions or unusual login/logout patterns that may indicate incomplete vport removals. 4) Coordinate with SAN fabric vendors to ensure firmware and switch software are up to date and compatible with patched Linux kernels. 5) Document and review NPIV usage policies, limiting NPIV deployment to necessary workloads to reduce attack surface and complexity. 6) Train system administrators on the implications of NPIV and the importance of proper unregistration procedures to prevent operational disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2024-36952: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up There are cases after NPIV deletion where the fabric switch still believes the NPIV is logged into the fabric. This occurs when a vport is unregistered before the Remove All DA_ID CT and LOGO ELS are sent to the fabric. Currently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including the fabric D_ID, removes the last ndlp reference and frees the ndlp rport object. This sometimes causes the race condition where the final DA_ID and LOGO are skipped from being sent to the fabric switch. Fix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID and LOGO are sent.
AI-Powered Analysis
Technical Analysis
CVE-2024-36952 is a vulnerability identified in the Linux kernel's SCSI subsystem, specifically related to the lpfc (LightPulse Fibre Channel) driver handling NPIV (N_Port ID Virtualization) transport unregistration. NPIV allows multiple virtual ports (vports) to share a single physical Fibre Channel port, enabling virtualization of storage area network (SAN) resources. The vulnerability arises due to a race condition during the unregistration process of NPIV vports. When a vport is unregistered, the Linux kernel calls fc_remove_host(), which in turn calls dev_loss_tmo for all destination IDs (D_IDs), including the fabric D_ID. This call removes the last reference to the node list data pointer (ndlp) and frees the associated remote port (rport) object. However, this premature freeing can cause the final DA_ID (Delete All IDs) and LOGO (Logout) Extended Link Service (ELS) commands, which notify the fabric switch of the vport's removal, to be skipped. As a result, the fabric switch may erroneously believe that the NPIV vport remains logged into the fabric, potentially leading to stale or inconsistent state information on the SAN fabric. The fix involves reordering the calls so that fc_remove_host() and scsi_remove_host() are invoked only after the DA_ID and LOGO ELS commands have been successfully sent to the fabric switch, ensuring proper cleanup and synchronization between the host and the fabric. This vulnerability is specific to Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and affects environments using the lpfc driver with NPIV enabled. No known exploits are reported in the wild as of the publication date (May 30, 2024).
Potential Impact
The impact of CVE-2024-36952 primarily concerns the integrity and availability of Fibre Channel SAN environments running on Linux systems with the lpfc driver and NPIV enabled. If the fabric switch retains stale NPIV login states due to skipped DA_ID and LOGO commands, it may lead to resource leaks, misrouting of storage traffic, or denial of service conditions on the SAN fabric. For European organizations relying on Linux-based SAN infrastructure for critical storage operations—such as financial institutions, healthcare providers, and large enterprises—this could result in degraded storage performance, increased operational complexity, or temporary loss of access to storage resources. Although this vulnerability does not directly expose confidentiality risks or allow remote code execution, the resulting SAN fabric inconsistencies could disrupt business continuity and complicate incident response. The absence of known exploits reduces immediate risk, but the complexity of SAN environments and the critical nature of storage systems in Europe amplify the importance of timely patching and monitoring.
Mitigation Recommendations
To mitigate CVE-2024-36952, European organizations should: 1) Apply the official Linux kernel patches that reorder the unregistration sequence to ensure DA_ID and LOGO ELS commands are sent before resource cleanup. This requires updating to a kernel version that includes the fix identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 or later. 2) Conduct thorough testing of SAN environments after patching to verify that NPIV vport removal behaves correctly and that fabric switches reflect accurate login states. 3) Implement monitoring on SAN fabric switches to detect stale NPIV sessions or unusual login/logout patterns that may indicate incomplete vport removals. 4) Coordinate with SAN fabric vendors to ensure firmware and switch software are up to date and compatible with patched Linux kernels. 5) Document and review NPIV usage policies, limiting NPIV deployment to necessary workloads to reduce attack surface and complexity. 6) Train system administrators on the implications of NPIV and the importance of proper unregistration procedures to prevent operational disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-30T15:25:07.080Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe2792
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 10:40:21 AM
Last updated: 8/1/2025, 1:33:15 AM
Views: 12
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.