Wiz Agents & Workflows are here

CVE-2024-56623
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-56623 is a use-after-free vulnerability discovered in the Linux kernel's SCSI qla2xxx driver. The vulnerability was disclosed on December 27, 2024, and affects multiple versions of the Linux kernel. The issue occurs during the unloading of the qla2xxx driver, where a race condition between two termination signals (UNLOADING flag and kthread_stop) can lead to a use-after-free condition (NVD).

Technical details

The vulnerability stems from a race condition in the driver's DPC (Deferred Procedure Call) thread termination logic. There are two signals used to terminate the dpc_thread: the UNLOADING flag and kthread_stop. When the UNLOADING flag is set and dpc_thread happens to run simultaneously, it causes the thread to exit and clean up. Subsequently, when kthread_stop is called for final cleanup, it results in a use-after-free condition. The issue manifests as a system crash with a stack trace warning at mm/slub.c:294. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (MEDIUM) by NIST and 7.8 (HIGH) by CISA-ADP (NVD).

Impact

When exploited, this vulnerability can cause a system crash, leading to a denial of service condition. The issue specifically affects systems using the qla2xxx driver during module unload operations. The vulnerability has been classified as CWE-416 (Use After Free) and primarily impacts system availability without compromising confidentiality or integrity (NVD).

Mitigation and workarounds

The vulnerability has been fixed in multiple Linux kernel versions. Fixed versions include Linux kernel 5.10.234-1 for Debian 11 bullseye and 6.1.128-1~deb11u1 for the linux-6.1 package. The fix involves removing the UNLOADING signal for terminating dpc_thread and using kthread_stop as the main signal to exit dpc_thread (Debian LTS, Debian Security).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23395CRITICAL9.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-devel-matched
NoYesMar 25, 2026
CVE-2026-23399MEDIUM6.5
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-devel-matched
NoYesMar 28, 2026
CVE-2026-23398MEDIUM6.5
  • Linux KernelLinux Kernel
  • kernel-abi-stablelists
NoYesMar 26, 2026
CVE-2026-23397MEDIUM4.4
  • Linux KernelLinux Kernel
  • kernel-devel
NoYesMar 26, 2026
CVE-2026-31788N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-trace-kvm
NoYesMar 25, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management