CVE-2024-46843: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Remove SCSI host only if added If host tries to remove ufshcd driver from a UFS device it would cause a kernel panic if ufshcd_async_scan fails during ufshcd_probe_hba before adding a SCSI host with scsi_add_host and MCQ is enabled since SCSI host has been defered after MCQ configuration introduced by commit 0cab4023ec7b ("scsi: ufs: core: Defer adding host to SCSI if MCQ is supported"). To guarantee that SCSI host is removed only if it has been added, set the scsi_host_added flag to true after adding a SCSI host and check whether it is set or not before removing it.
AI Analysis
Technical Summary
CVE-2024-46843 is a vulnerability identified in the Linux kernel specifically affecting the SCSI (Small Computer System Interface) subsystem for UFS (Universal Flash Storage) devices. The issue arises during the process of probing the UFS host bus adapter (HBA) when the Multi-Queue Command (MCQ) feature is enabled. The vulnerability is triggered if the kernel attempts to remove the ufshcd driver from a UFS device and the asynchronous scan (ufshcd_async_scan) fails during the probe phase (ufshcd_probe_hba). Under these conditions, the kernel may attempt to remove a SCSI host that was never successfully added due to the deferred addition of the SCSI host introduced by a prior commit (0cab4023ec7b). This improper removal leads to a kernel panic, causing a denial of service (DoS) by crashing the system. The root cause is that the kernel did not track whether the SCSI host was actually added before attempting removal. The fix involves setting a flag (scsi_host_added) to true only after the SCSI host is successfully added and checking this flag before removal to prevent invalid operations. This vulnerability affects Linux kernel versions containing the specified commit and impacts systems using UFS storage with MCQ enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with affected versions that utilize UFS storage devices, particularly in environments where MCQ is enabled. The impact is a potential denial of service through kernel panic, which can cause system crashes and downtime. This can disrupt critical services, especially in sectors relying on embedded Linux systems or servers using UFS storage, such as telecommunications, automotive, industrial control, and cloud infrastructure providers. The vulnerability does not appear to allow privilege escalation or remote code execution but can degrade availability, impacting business continuity and operational reliability. Organizations with large-scale Linux deployments or those using UFS devices in critical infrastructure should be particularly vigilant. Given the lack of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to accidental or targeted triggering of the kernel panic.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems using UFS storage devices with MCQ enabled. 2) Apply the latest Linux kernel patches that address CVE-2024-46843 as soon as they are available from trusted Linux distributions or kernel maintainers. 3) For systems where immediate patching is not feasible, consider disabling MCQ support for UFS devices as a temporary workaround, if operationally acceptable. 4) Implement robust monitoring and alerting for kernel panics or unexpected reboots to detect potential exploitation attempts or accidental triggers. 5) Test patches in staging environments to ensure compatibility and stability before deployment in production. 6) Maintain regular backups and disaster recovery plans to minimize downtime impact. 7) Engage with Linux vendor support channels for guidance on patch availability and deployment best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Italy, Spain, Poland
CVE-2024-46843: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Remove SCSI host only if added If host tries to remove ufshcd driver from a UFS device it would cause a kernel panic if ufshcd_async_scan fails during ufshcd_probe_hba before adding a SCSI host with scsi_add_host and MCQ is enabled since SCSI host has been defered after MCQ configuration introduced by commit 0cab4023ec7b ("scsi: ufs: core: Defer adding host to SCSI if MCQ is supported"). To guarantee that SCSI host is removed only if it has been added, set the scsi_host_added flag to true after adding a SCSI host and check whether it is set or not before removing it.
AI-Powered Analysis
Technical Analysis
CVE-2024-46843 is a vulnerability identified in the Linux kernel specifically affecting the SCSI (Small Computer System Interface) subsystem for UFS (Universal Flash Storage) devices. The issue arises during the process of probing the UFS host bus adapter (HBA) when the Multi-Queue Command (MCQ) feature is enabled. The vulnerability is triggered if the kernel attempts to remove the ufshcd driver from a UFS device and the asynchronous scan (ufshcd_async_scan) fails during the probe phase (ufshcd_probe_hba). Under these conditions, the kernel may attempt to remove a SCSI host that was never successfully added due to the deferred addition of the SCSI host introduced by a prior commit (0cab4023ec7b). This improper removal leads to a kernel panic, causing a denial of service (DoS) by crashing the system. The root cause is that the kernel did not track whether the SCSI host was actually added before attempting removal. The fix involves setting a flag (scsi_host_added) to true only after the SCSI host is successfully added and checking this flag before removal to prevent invalid operations. This vulnerability affects Linux kernel versions containing the specified commit and impacts systems using UFS storage with MCQ enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with affected versions that utilize UFS storage devices, particularly in environments where MCQ is enabled. The impact is a potential denial of service through kernel panic, which can cause system crashes and downtime. This can disrupt critical services, especially in sectors relying on embedded Linux systems or servers using UFS storage, such as telecommunications, automotive, industrial control, and cloud infrastructure providers. The vulnerability does not appear to allow privilege escalation or remote code execution but can degrade availability, impacting business continuity and operational reliability. Organizations with large-scale Linux deployments or those using UFS devices in critical infrastructure should be particularly vigilant. Given the lack of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to accidental or targeted triggering of the kernel panic.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems using UFS storage devices with MCQ enabled. 2) Apply the latest Linux kernel patches that address CVE-2024-46843 as soon as they are available from trusted Linux distributions or kernel maintainers. 3) For systems where immediate patching is not feasible, consider disabling MCQ support for UFS devices as a temporary workaround, if operationally acceptable. 4) Implement robust monitoring and alerting for kernel panics or unexpected reboots to detect potential exploitation attempts or accidental triggers. 5) Test patches in staging environments to ensure compatibility and stability before deployment in production. 6) Maintain regular backups and disaster recovery plans to minimize downtime impact. 7) Engage with Linux vendor support channels for guidance on patch availability and deployment best practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-11T15:12:18.289Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec04a
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 5:26:33 AM
Last updated: 8/13/2025, 1:29:08 AM
Views: 17
Related Threats
CVE-2025-8975: Cross Site Scripting in givanz Vvveb
MediumCVE-2025-55716: CWE-862 Missing Authorization in VeronaLabs WP Statistics
MediumCVE-2025-55714: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crocoblock JetElements For Elementor
MediumCVE-2025-55713: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CreativeThemes Blocksy
MediumCVE-2025-55712: CWE-862 Missing Authorization in POSIMYTH The Plus Addons for Elementor Page Builder Lite
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.