Skip to main content

CVE-2024-56747: Vulnerability in Linux Linux

Low
VulnerabilityCVE-2024-56747cvecve-2024-56747
Published: Sun Dec 29 2024 (12/29/2024, 11:30:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() Hook "qedi_ops->common->sb_init = qed_sb_init" does not release the DMA memory sb_virt when it fails. Add dma_free_coherent() to free it. This is the same way as qedr_alloc_mem_sb() and qede_alloc_mem_sb().

AI-Powered Analysis

AILast updated: 06/28/2025, 07:40:58 UTC

Technical Analysis

CVE-2024-56747 addresses a vulnerability in the Linux kernel's SCSI subsystem, specifically within the qedi driver, which is responsible for handling certain Fibre Channel over Ethernet (FCoE) devices. The issue lies in the function qedi_alloc_and_init_sb(), where a failure in the initialization hook (qedi_ops->common->sb_init = qed_sb_init) does not properly release allocated DMA (Direct Memory Access) memory, referred to as sb_virt. This results in a potential memory leak because the allocated DMA memory is not freed upon failure. The fix involves adding a call to dma_free_coherent() to release this memory, aligning the behavior with similar functions such as qedr_alloc_mem_sb() and qede_alloc_mem_sb(). The vulnerability is categorized under CWE-401 (Improper Release of Memory Before Removing Last Reference or Memory Leak). The CVSS v3.1 base score is 3.3, indicating a low severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, meaning the attack requires local access with low complexity, privileges, no user interaction, and impacts availability only (memory leak). There are no known exploits in the wild, and the vulnerability affects specific Linux kernel versions identified by commit hashes. The issue is technical and subtle, primarily impacting system stability and resource management rather than confidentiality or integrity.

Potential Impact

For European organizations, the impact of CVE-2024-56747 is primarily related to system stability and availability. The memory leak in the qedi driver could lead to gradual resource exhaustion on affected systems, potentially causing degraded performance or crashes in environments heavily utilizing Fibre Channel over Ethernet storage solutions. This could affect data centers, cloud providers, and enterprises relying on Linux servers with qedi-enabled hardware for storage networking. While the vulnerability does not directly compromise confidentiality or integrity, prolonged memory leaks can lead to denial of service conditions, impacting critical business operations. Organizations with high-density Linux deployments or those running storage-intensive workloads may experience increased maintenance overhead and risk of unexpected downtime if unpatched. However, the low CVSS score and lack of known exploits suggest the immediate risk is limited, but patching remains important to maintain system reliability.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that address this memory leak in the qedi driver. Since the vulnerability requires local access and privileges, limiting user access to trusted personnel and enforcing strict privilege separation can reduce exploitation risk. Monitoring system logs and memory usage patterns on servers using qedi drivers can help detect abnormal resource consumption early. Implementing automated patch management processes for Linux kernel updates will ensure timely remediation. Additionally, organizations should validate that their storage hardware and drivers are up to date and compatible with patched kernel versions. For critical systems, consider isolating or limiting the use of affected qedi-based storage interfaces until patches are applied. Regular backups and redundancy in storage infrastructure will mitigate potential availability impacts from unexpected failures related to this issue.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T11:26:39.758Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde6ed

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 7:40:58 AM

Last updated: 8/16/2025, 2:50:37 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats