Skip to main content

CVE-2024-26762: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26762cvecve-2024-26762
Published: Wed Apr 03 2024 (04/03/2024, 17:00:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: cxl/pci: Skip to handle RAS errors if CXL.mem device is detached The PCI AER model is an awkward fit for CXL error handling. While the expectation is that a PCI device can escalate to link reset to recover from an AER event, the same reset on CXL amounts to a surprise memory hotplug of massive amounts of memory. At present, the CXL error handler attempts some optimistic error handling to unbind the device from the cxl_mem driver after reaping some RAS register values. This results in a "hopeful" attempt to unplug the memory, but there is no guarantee that will succeed. A subsequent AER notification after the memdev unbind event can no longer assume the registers are mapped. Check for memdev bind before reaping status register values to avoid crashes of the form: BUG: unable to handle page fault for address: ffa00000195e9100 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page [...] RIP: 0010:__cxl_handle_ras+0x30/0x110 [cxl_core] [...] Call Trace: <TASK> ? __die+0x24/0x70 ? page_fault_oops+0x82/0x160 ? kernelmode_fixup_or_oops+0x84/0x110 ? exc_page_fault+0x113/0x170 ? asm_exc_page_fault+0x26/0x30 ? __pfx_dpc_reset_link+0x10/0x10 ? __cxl_handle_ras+0x30/0x110 [cxl_core] ? find_cxl_port+0x59/0x80 [cxl_core] cxl_handle_rp_ras+0xbc/0xd0 [cxl_core] cxl_error_detected+0x6c/0xf0 [cxl_core] report_error_detected+0xc7/0x1c0 pci_walk_bus+0x73/0x90 pcie_do_recovery+0x23f/0x330 Longer term, the unbind and PCI_ERS_RESULT_DISCONNECT behavior might need to be replaced with a new PCI_ERS_RESULT_PANIC.

AI-Powered Analysis

AILast updated: 06/29/2025, 18:24:42 UTC

Technical Analysis

CVE-2024-26762 is a vulnerability identified in the Linux kernel's handling of Compute Express Link (CXL) memory devices, specifically within the PCI Advanced Error Reporting (AER) error handling model. The Linux kernel attempts to manage errors from CXL.mem devices by unbinding the device from the cxl_mem driver after collecting some Reliability, Availability, and Serviceability (RAS) register values. However, the PCI AER model is not well-suited for CXL error handling because a PCI device reset typically recovers from errors by resetting the link, whereas for CXL, this reset corresponds to a memory hotplug event involving large amounts of memory. The vulnerability arises because after the memory device is unbound, subsequent AER notifications incorrectly assume that the device's registers remain mapped. This leads to kernel page faults and crashes when the kernel tries to access unmapped memory addresses, as demonstrated by the provided kernel panic and call trace. The root cause is the lack of a check to confirm whether the memory device is still bound before accessing status registers during error handling. The patch involves adding this check to prevent the kernel from dereferencing invalid memory, thus avoiding crashes. The vulnerability highlights a fundamental mismatch between PCI error handling expectations and CXL device behavior, suggesting that longer-term fixes may require changes to the PCI error recovery model, potentially introducing a new PCI_ERS_RESULT_PANIC result instead of the current PCI_ERS_RESULT_DISCONNECT. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with CXL.mem device support, which are increasingly used in high-performance computing, data centers, and cloud infrastructure. A successful exploitation could cause kernel crashes (denial of service) on affected systems, leading to system instability, unplanned downtime, and potential data loss or corruption if memory hotplug events are mishandled. This is particularly critical for enterprises relying on large-scale memory expansion via CXL devices, such as research institutions, financial services, and telecommunications providers. While the vulnerability does not appear to allow privilege escalation or direct data compromise, the resulting instability could disrupt critical services and impact business continuity. Additionally, recovery from such crashes may require manual intervention, increasing operational costs and downtime. Given the complexity of CXL error handling, the vulnerability could also hinder the deployment of CXL technology in production environments until fully resolved.

Mitigation Recommendations

European organizations should promptly update their Linux kernels to versions that include the fix for CVE-2024-26762 once available. Until patches are applied, administrators should monitor kernel logs for signs of CXL-related errors and avoid performing memory hotplug operations on CXL devices in production environments. It is advisable to implement robust system monitoring and automated recovery mechanisms to detect and respond to kernel crashes quickly. Organizations should also review their use of CXL.mem devices and consider isolating critical workloads from systems with vulnerable kernel versions. Engaging with Linux distribution vendors for timely patch releases and guidance is essential. For longer-term mitigation, organizations should track developments in PCI error recovery models and plan for kernel upgrades that incorporate improved CXL error handling. Additionally, testing CXL device behavior in controlled environments before deployment can help identify potential stability issues related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.172Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe3ad8

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 6:24:42 PM

Last updated: 8/6/2025, 2:23:53 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats