CVE-2024-42124
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-42124 affects the Linux kernel's SCSI subsystem, specifically the qedf driver. The vulnerability was discovered when calling smpprocessorid() from preemptible code in qedfexecutetmf(), which results in a BUG_ON() condition when running on an RT (Real-Time) kernel. The issue was disclosed in July 2024 (Kernel Git).

Technical details

The vulnerability occurs in the qedfexecutetmf() function within the SCSI qedf driver. The issue arises from calling smpprocessorid() in a preemptible code section, which is not allowed in RT kernel configurations. When triggered, it results in a kernel bug report with the message 'BUG: using smpprocessorid() in preemptible [00000000] code: sg_reset/3646' (Kernel Git).

Impact

When exploited, this vulnerability can cause a kernel panic on systems running RT (Real-Time) kernels, leading to a denial of service condition. This is particularly concerning for systems requiring real-time operations where system stability is crucial (Ubuntu Security).

Mitigation and workarounds

The issue has been fixed by moving the smpprocessorid() call inside a non-preemptible section of code. Patches have been released for various Linux distributions including Ubuntu 20.04 LTS, 22.04 LTS, and 24.04 LTS. Users are advised to update their systems to the patched kernel versions (Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management