CVE-2024-38598: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size Is is reported that for dm-raid10, lvextend + lvchange --syncaction will trigger following softlockup: kernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976] CPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1 RIP: 0010:_raw_spin_unlock_irq+0x13/0x30 Call Trace: <TASK> md_bitmap_start_sync+0x6b/0xf0 raid10_sync_request+0x25c/0x1b40 [raid10] md_do_sync+0x64b/0x1020 md_thread+0xa7/0x170 kthread+0xcf/0x100 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1a/0x30 And the detailed process is as follows: md_do_sync j = mddev->resync_min while (j < max_sectors) sectors = raid10_sync_request(mddev, j, &skipped) if (!md_bitmap_start_sync(..., &sync_blocks)) // md_bitmap_start_sync set sync_blocks to 0 return sync_blocks + sectors_skippe; // sectors = 0; j += sectors; // j never change Root cause is that commit 301867b1c168 ("md/raid10: check slab-out-of-bounds in md_bitmap_get_counter") return early from md_bitmap_get_counter(), without setting returned blocks. Fix this problem by always set returned blocks from md_bitmap_get_counter"(), as it used to be. Noted that this patch just fix the softlockup problem in kernel, the case that bitmap size doesn't match array size still need to be fixed.
AI Analysis
Technical Summary
CVE-2024-38598 is a vulnerability identified in the Linux kernel's md (multiple device) subsystem, specifically affecting the RAID10 implementation. The issue arises when the bitmap size used for resynchronization is smaller than the array size, which can lead to a kernel soft lockup during certain operations such as lvextend combined with lvchange --syncaction on dm-raid10 devices. The root cause is a logic flaw introduced by commit 301867b1c168, where the function md_bitmap_get_counter() returns early without setting the expected number of blocks to sync, causing the resync loop in md_do_sync() to stall indefinitely. This results in a CPU soft lockup, where the kernel watchdog detects that a CPU is stuck for an extended period (e.g., 26 seconds), effectively halting progress on the resync thread. The vulnerability does not cause data corruption directly but leads to a denial of service (DoS) condition by freezing the RAID resync process. The patch fixes this by ensuring md_bitmap_get_counter() always sets the returned block count, restoring the expected control flow. However, the underlying mismatch between bitmap size and array size remains an unresolved condition that could cause operational issues. This vulnerability affects multiple Linux kernel versions prior to the fix and is particularly relevant for systems using software RAID10 with device mapper logical volumes. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2024-38598 primarily manifests as a denial of service on systems utilizing Linux software RAID10 configurations with device mapper logical volumes. This can disrupt critical storage operations, especially in environments relying on RAID10 for redundancy and performance, such as data centers, cloud providers, and enterprises with on-premises Linux infrastructure. The soft lockup can cause prolonged unavailability of storage arrays, potentially leading to application downtime, delayed backups, or interrupted data synchronization. While no direct data corruption or privilege escalation is indicated, the operational disruption can affect business continuity and service level agreements. Organizations with high reliance on Linux-based storage solutions in sectors like finance, telecommunications, healthcare, and government could experience significant operational risk. The vulnerability's impact is heightened in environments where automated resyncs or volume extensions are routine, as these operations might trigger the lockup. Given the kernel-level nature of the issue, recovery typically requires a system reboot or manual intervention, which may not be feasible in high-availability setups without planned maintenance windows.
Mitigation Recommendations
To mitigate CVE-2024-38598, European organizations should: 1) Apply the official Linux kernel patches that address the md_bitmap_get_counter() logic to ensure the soft lockup condition is resolved. 2) Audit and verify the consistency between bitmap sizes and array sizes in RAID10 configurations to prevent triggering the underlying mismatch condition. 3) Avoid performing lvextend and lvchange --syncaction operations concurrently on dm-raid10 devices until patches are applied. 4) Implement monitoring for kernel soft lockups and RAID resync progress to detect early signs of this issue. 5) For critical systems, consider temporarily migrating to alternative RAID configurations or hardware RAID solutions until the kernel is updated. 6) Maintain up-to-date backups and test recovery procedures to minimize downtime in case of forced reboots. 7) Engage with Linux distribution vendors for timely updates and backported patches, especially for long-term support kernels. 8) Document and train system administrators on this vulnerability to ensure awareness during storage maintenance operations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-38598: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size Is is reported that for dm-raid10, lvextend + lvchange --syncaction will trigger following softlockup: kernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976] CPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1 RIP: 0010:_raw_spin_unlock_irq+0x13/0x30 Call Trace: <TASK> md_bitmap_start_sync+0x6b/0xf0 raid10_sync_request+0x25c/0x1b40 [raid10] md_do_sync+0x64b/0x1020 md_thread+0xa7/0x170 kthread+0xcf/0x100 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1a/0x30 And the detailed process is as follows: md_do_sync j = mddev->resync_min while (j < max_sectors) sectors = raid10_sync_request(mddev, j, &skipped) if (!md_bitmap_start_sync(..., &sync_blocks)) // md_bitmap_start_sync set sync_blocks to 0 return sync_blocks + sectors_skippe; // sectors = 0; j += sectors; // j never change Root cause is that commit 301867b1c168 ("md/raid10: check slab-out-of-bounds in md_bitmap_get_counter") return early from md_bitmap_get_counter(), without setting returned blocks. Fix this problem by always set returned blocks from md_bitmap_get_counter"(), as it used to be. Noted that this patch just fix the softlockup problem in kernel, the case that bitmap size doesn't match array size still need to be fixed.
AI-Powered Analysis
Technical Analysis
CVE-2024-38598 is a vulnerability identified in the Linux kernel's md (multiple device) subsystem, specifically affecting the RAID10 implementation. The issue arises when the bitmap size used for resynchronization is smaller than the array size, which can lead to a kernel soft lockup during certain operations such as lvextend combined with lvchange --syncaction on dm-raid10 devices. The root cause is a logic flaw introduced by commit 301867b1c168, where the function md_bitmap_get_counter() returns early without setting the expected number of blocks to sync, causing the resync loop in md_do_sync() to stall indefinitely. This results in a CPU soft lockup, where the kernel watchdog detects that a CPU is stuck for an extended period (e.g., 26 seconds), effectively halting progress on the resync thread. The vulnerability does not cause data corruption directly but leads to a denial of service (DoS) condition by freezing the RAID resync process. The patch fixes this by ensuring md_bitmap_get_counter() always sets the returned block count, restoring the expected control flow. However, the underlying mismatch between bitmap size and array size remains an unresolved condition that could cause operational issues. This vulnerability affects multiple Linux kernel versions prior to the fix and is particularly relevant for systems using software RAID10 with device mapper logical volumes. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2024-38598 primarily manifests as a denial of service on systems utilizing Linux software RAID10 configurations with device mapper logical volumes. This can disrupt critical storage operations, especially in environments relying on RAID10 for redundancy and performance, such as data centers, cloud providers, and enterprises with on-premises Linux infrastructure. The soft lockup can cause prolonged unavailability of storage arrays, potentially leading to application downtime, delayed backups, or interrupted data synchronization. While no direct data corruption or privilege escalation is indicated, the operational disruption can affect business continuity and service level agreements. Organizations with high reliance on Linux-based storage solutions in sectors like finance, telecommunications, healthcare, and government could experience significant operational risk. The vulnerability's impact is heightened in environments where automated resyncs or volume extensions are routine, as these operations might trigger the lockup. Given the kernel-level nature of the issue, recovery typically requires a system reboot or manual intervention, which may not be feasible in high-availability setups without planned maintenance windows.
Mitigation Recommendations
To mitigate CVE-2024-38598, European organizations should: 1) Apply the official Linux kernel patches that address the md_bitmap_get_counter() logic to ensure the soft lockup condition is resolved. 2) Audit and verify the consistency between bitmap sizes and array sizes in RAID10 configurations to prevent triggering the underlying mismatch condition. 3) Avoid performing lvextend and lvchange --syncaction operations concurrently on dm-raid10 devices until patches are applied. 4) Implement monitoring for kernel soft lockups and RAID resync progress to detect early signs of this issue. 5) For critical systems, consider temporarily migrating to alternative RAID configurations or hardware RAID solutions until the kernel is updated. 6) Maintain up-to-date backups and test recovery procedures to minimize downtime in case of forced reboots. 7) Engage with Linux distribution vendors for timely updates and backported patches, especially for long-term support kernels. 8) Document and train system administrators on this vulnerability to ensure awareness during storage maintenance operations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-06-18T19:36:34.932Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9821c4522896dcbdde20
Added to database: 5/21/2025, 9:08:49 AM
Last enriched: 6/28/2025, 3:55:55 AM
Last updated: 7/31/2025, 9:44:38 PM
Views: 13
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.