PatchSiren cyber security CVE debrief
CVE-2024-24855 Linux CVE debrief
CVE-2024-24855 is a Linux kernel vulnerability published on 2024-02-05 and later modified on 2026-05-12 in NVD. The issue is a race condition in lpfc_unregister_fcf_rescan() that can lead to a null pointer dereference, with possible impact ranging from a kernel crash to denial of service. NVD classifies the issue as medium severity, and the supplied vector indicates local access, low privileges, and user interaction are required.
- Vendor
- Linux
- Product
- CVE-2024-24855
- CVSS
- MEDIUM 5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-02-05
- Original CVE updated
- 2026-05-12
- Advisory published
- 2024-02-05
- Advisory updated
- 2026-05-12
Who should care
Linux distribution security teams, kernel maintainers, and operators of systems that run affected Linux kernel branches should care, especially where the lpfc code path is present and system availability is important.
Technical summary
The supplied NVD record describes a race condition in the Linux kernel scsi device driver function lpfc_unregister_fcf_rescan(). NVD maps the weakness to CWE-362 and CWE-476 and lists affected kernel ranges including versions up to 2.6.33.20 and 6.0 through 6.4.16, plus the 2.6.34-rc1 and 6.5-rc1 lines. The CVSS vector is CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H, which suggests exploitation is constrained but can still affect availability.
Defensive priority
Medium
Recommended defensive actions
- Identify whether your Linux systems run kernel versions in the affected ranges listed by NVD.
- Check whether the lpfc driver path is present in your environment and prioritize systems where kernel availability is critical.
- Apply vendor or distribution kernel updates referenced by official advisories as they become available.
- Monitor for unexpected kernel crashes, panics, or denial-of-service symptoms on systems matching the affected criteria.
- Use least privilege and restrict unnecessary local access, since the supplied CVSS vector requires local access and user interaction.
Evidence notes
All claims are based on the supplied NVD record and its official or referenced links: CVE record, NVD detail page, and downstream references from OpenAnolis Bugzilla, Debian LTS announce, and Siemens CERT. The record identifies the issue as a race condition in lpfc_unregister_fcf_rescan(), maps it to CWE-362 and CWE-476, and lists affected Linux kernel version ranges. No exploit code, weaponized reproduction, or unverified fix version is included here.
Official resources
-
CVE-2024-24855 CVE record
CVE.org
-
CVE-2024-24855 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
[email protected] - Permissions Required
-
Source reference
af854a3a-2127-422b-91ae-364da2661108
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Publicly disclosed by NVD on 2024-02-05; the record was later modified on 2026-05-12. This debrief uses only the supplied source corpus and official references.