Skip to main content

CVE-2024-26880: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26880cvecve-2024-26880
Published: Wed Apr 17 2024 (04/17/2024, 10:27:37 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend There is this reported crash when experimenting with the lvm2 testsuite. The list corruption is caused by the fact that the postsuspend and resume methods were not paired correctly; there were two consecutive calls to the origin_postsuspend function. The second call attempts to remove the "hash_list" entry from a list, while it was already removed by the first call. Fix __dm_internal_resume so that it calls the preresume and resume methods of the table's targets. If a preresume method of some target fails, we are in a tricky situation. We can't return an error because dm_internal_resume isn't supposed to return errors. We can't return success, because then the "resume" and "postsuspend" methods would not be paired correctly. So, we set the DMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace tools, but it won't cause a kernel crash. ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:56! invalid opcode: 0000 [#1] PREEMPT SMP CPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 RIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0 <snip> RSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282 RAX: 000000000000004e RBX: ffff888143b6eb80 RCX: 0000000000000000 RDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff RBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 0000000000000058 R10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001 R13: ffff88814538e000 R14: ffff888143bc6dc0 R15: ffffffffa02e4bb0 FS: 00000000f7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0 Call Trace: <TASK> ? die+0x2d/0x80 ? do_trap+0xeb/0xf0 ? __list_del_entry_valid_or_report+0x77/0xc0 ? do_error_trap+0x60/0x80 ? __list_del_entry_valid_or_report+0x77/0xc0 ? exc_invalid_op+0x49/0x60 ? __list_del_entry_valid_or_report+0x77/0xc0 ? asm_exc_invalid_op+0x16/0x20 ? table_deps+0x1b0/0x1b0 [dm_mod] ? __list_del_entry_valid_or_report+0x77/0xc0 origin_postsuspend+0x1a/0x50 [dm_snapshot] dm_table_postsuspend_targets+0x34/0x50 [dm_mod] dm_suspend+0xd8/0xf0 [dm_mod] dev_suspend+0x1f2/0x2f0 [dm_mod] ? table_deps+0x1b0/0x1b0 [dm_mod] ctl_ioctl+0x300/0x5f0 [dm_mod] dm_compat_ctl_ioctl+0x7/0x10 [dm_mod] __x64_compat_sys_ioctl+0x104/0x170 do_syscall_64+0x184/0x1b0 entry_SYSCALL_64_after_hwframe+0x46/0x4e RIP: 0033:0xf7e6aead <snip> ---[ end trace 0000000000000000 ]---

AI-Powered Analysis

AILast updated: 06/29/2025, 19:55:22 UTC

Technical Analysis

CVE-2024-26880 is a vulnerability in the Linux kernel's device mapper (dm) subsystem, specifically related to the handling of suspend and resume operations on internal device mapper targets. The flaw arises from improper pairing of the postsuspend and resume method calls within the dm internal resume function (__dm_internal_resume). During suspend/resume cycles, the origin_postsuspend function was called twice consecutively, leading to list corruption because the second call attempts to remove a "hash_list" entry that was already removed by the first call. This results in a kernel crash due to invalid list operations, as evidenced by the kernel BUG triggered in list_debug.c. The root cause is a logic error in the dm internal resume process where the preresume and resume methods of the device mapper targets were not correctly invoked. The fix involves ensuring that __dm_internal_resume properly calls the preresume and resume methods in the correct sequence. If a preresume method fails, the kernel sets the DMF_SUSPENDED flag and fakes a normal suspend to avoid crashing, though this may confuse userspace tools. The vulnerability can be triggered by operations involving the lvm2 testsuite or other device mapper targets that use suspend/resume methods. The CVSS v3.1 score is 6.3 (medium severity) with vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L, indicating network attack vector, low attack complexity, requiring privileges, no user interaction, unchanged scope, and impacts on confidentiality, integrity, and availability. Exploitation leads to denial of service via kernel crash and potential data integrity issues due to list corruption. No known exploits are reported in the wild yet. The vulnerability affects Linux kernel versions identified by the given commit hashes, including kernel 6.8.0-rc6 as per the crash log.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected device mapper code, especially those using LVM (Logical Volume Manager) or other device mapper targets that implement suspend/resume methods. The impact includes potential denial of service due to kernel crashes, which can disrupt critical services, especially in server environments, cloud infrastructure, and virtualized platforms where device mapper is commonly used. The integrity of storage management could also be compromised, potentially leading to data corruption or loss if the list corruption affects volume management operations. Organizations relying on Linux-based infrastructure for databases, file servers, or virtual machines may experience outages or degraded performance. Since the vulnerability requires local privileges to exploit (PR:L), attackers with limited access could escalate impact by causing system instability. This is particularly concerning for multi-tenant cloud providers and hosting services prevalent in Europe. The confusion caused by the workaround (faking suspend) may also lead to management or monitoring tools misreporting device states, complicating incident response. Overall, the vulnerability threatens availability and integrity of Linux-based storage management systems, which are widely deployed across European enterprises, government agencies, and critical infrastructure.

Mitigation Recommendations

1. Apply the official Linux kernel patches that fix the __dm_internal_resume function to ensure correct pairing of postsuspend and resume calls. Monitor Linux kernel security advisories and update kernels promptly. 2. For organizations unable to immediately patch, consider disabling or limiting use of device mapper suspend/resume features or avoid running the lvm2 testsuite or similar operations that trigger the vulnerability. 3. Implement strict access controls to limit local user privileges, reducing the risk of exploitation by unprivileged users. 4. Enhance monitoring of kernel logs and device mapper subsystem for signs of crashes or suspicious suspend/resume activity to detect exploitation attempts early. 5. Test kernel updates in staging environments to verify stability and compatibility with existing device mapper configurations before production deployment. 6. Educate system administrators about the vulnerability and the importance of timely patching, especially in environments using LVM or complex storage setups. 7. Consider deploying kernel live patching solutions where available to reduce downtime and exposure windows. 8. Review and harden userspace tools interacting with device mapper to handle unexpected suspend/resume states gracefully, minimizing operational confusion.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.185Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3e3c

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:55:22 PM

Last updated: 8/12/2025, 4:49:30 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats