Skip to main content

CVE-2024-45013: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-45013cvecve-2024-45013
Published: Wed Sep 11 2024 (09/11/2024, 15:13:50 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: nvme: move stopping keep-alive into nvme_uninit_ctrl() Commit 4733b65d82bd ("nvme: start keep-alive after admin queue setup") moves starting keep-alive from nvme_start_ctrl() into nvme_init_ctrl_finish(), but don't move stopping keep-alive into nvme_uninit_ctrl(), so keep-alive work can be started and keep pending after failing to start controller, finally use-after-free is triggered if nvme host driver is unloaded. This patch fixes kernel panic when running nvme/004 in case that connection failure is triggered, by moving stopping keep-alive into nvme_uninit_ctrl(). This way is reasonable because keep-alive is now started in nvme_init_ctrl_finish().

AI-Powered Analysis

AILast updated: 06/28/2025, 23:55:18 UTC

Technical Analysis

CVE-2024-45013 is a vulnerability identified in the Linux kernel's NVMe (Non-Volatile Memory Express) driver subsystem. The issue arises due to improper handling of the keep-alive mechanism during the initialization and uninitialization of NVMe controllers. Specifically, a recent code change moved the starting of the keep-alive process to the function nvme_init_ctrl_finish(), but failed to correspondingly move the stopping of the keep-alive process into nvme_uninit_ctrl(). This oversight allows the keep-alive work to remain active and pending even after a controller fails to start and the NVMe host driver is unloaded. Consequently, this leads to a use-after-free condition, which can cause kernel panics or potentially be exploited to execute arbitrary code or cause denial of service. The patch corrects this by ensuring that stopping the keep-alive process is properly handled in nvme_uninit_ctrl(), aligning the lifecycle management of the keep-alive mechanism with the controller's initialization and teardown. The vulnerability is triggered particularly when connection failures occur during NVMe controller startup, as demonstrated by kernel panic during the nvme/004 test case. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions containing the specified commit hashes prior to the patch. This flaw is significant because NVMe is widely used in modern storage devices, and the kernel is a critical component in many systems, including servers, desktops, and embedded devices.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with NVMe storage devices. The impact includes potential system instability due to kernel panics, which can lead to denial of service conditions. In environments where high availability and data integrity are critical—such as financial institutions, healthcare providers, and industrial control systems—unexpected kernel panics can disrupt operations and cause data loss or corruption. Although no active exploitation is currently known, the use-after-free nature of the bug could be leveraged by a local attacker or malicious software with sufficient privileges to escalate privileges or execute arbitrary code in the kernel context, thereby compromising system confidentiality and integrity. Organizations relying on Linux-based infrastructure with NVMe storage, including cloud service providers and data centers in Europe, could face operational risks if this vulnerability is not addressed promptly. The vulnerability also affects embedded Linux devices, which are common in IoT and industrial environments, potentially impacting critical infrastructure sectors.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the patched versions that address CVE-2024-45013. Since the vulnerability arises from kernel code, applying vendor-supplied kernel updates or recompiling the kernel with the fix is essential. Organizations should audit their systems to identify those running affected kernel versions with NVMe support. For environments where immediate patching is not feasible, temporarily disabling NVMe devices or modules may reduce exposure, though this could impact performance or functionality. Monitoring system logs for kernel panics related to NVMe operations can help detect attempts to trigger the vulnerability. Additionally, enforcing strict access controls to limit local user privileges reduces the risk of exploitation, as the vulnerability requires local code execution capabilities. Security teams should also integrate this vulnerability into their vulnerability management and incident response workflows to ensure timely detection and remediation. Finally, organizations should maintain regular backups and implement robust recovery procedures to mitigate potential data loss from system crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-21T05:34:56.681Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0ed2

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/28/2025, 11:55:18 PM

Last updated: 7/28/2025, 10:17:18 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats