CVE-2024-41031: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mm/filemap: skip to create PMD-sized page cache if needed On ARM64, HPAGE_PMD_ORDER is 13 when the base page size is 64KB. The PMD-sized page cache can't be supported by xarray as the following error messages indicate. ------------[ cut here ]------------ WARNING: CPU: 35 PID: 7484 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128 Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \ nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \ nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \ ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm \ fuse xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 \ sha1_ce virtio_net net_failover virtio_console virtio_blk failover \ dimlib virtio_mmio CPU: 35 PID: 7484 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #9 Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : xas_split_alloc+0xf8/0x128 lr : split_huge_page_to_list_to_order+0x1c4/0x720 sp : ffff800087a4f6c0 x29: ffff800087a4f6c0 x28: ffff800087a4f720 x27: 000000001fffffff x26: 0000000000000c40 x25: 000000000000000d x24: ffff00010625b858 x23: ffff800087a4f720 x22: ffffffdfc0780000 x21: 0000000000000000 x20: 0000000000000000 x19: ffffffdfc0780000 x18: 000000001ff40000 x17: 00000000ffffffff x16: 0000018000000000 x15: 51ec004000000000 x14: 0000e00000000000 x13: 0000000000002000 x12: 0000000000000020 x11: 51ec000000000000 x10: 51ece1c0ffff8000 x9 : ffffbeb961a44d28 x8 : 0000000000000003 x7 : ffffffdfc0456420 x6 : ffff0000e1aa6eb8 x5 : 20bf08b4fe778fca x4 : ffffffdfc0456420 x3 : 0000000000000c40 x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000 Call trace: xas_split_alloc+0xf8/0x128 split_huge_page_to_list_to_order+0x1c4/0x720 truncate_inode_partial_folio+0xdc/0x160 truncate_inode_pages_range+0x1b4/0x4a8 truncate_pagecache_range+0x84/0xa0 xfs_flush_unmap_range+0x70/0x90 [xfs] xfs_file_fallocate+0xfc/0x4d8 [xfs] vfs_fallocate+0x124/0x2e8 ksys_fallocate+0x4c/0xa0 __arm64_sys_fallocate+0x24/0x38 invoke_syscall.constprop.0+0x7c/0xd8 do_el0_svc+0xb4/0xd0 el0_svc+0x44/0x1d8 el0t_64_sync_handler+0x134/0x150 el0t_64_sync+0x17c/0x180 Fix it by skipping to allocate PMD-sized page cache when its size is larger than MAX_PAGECACHE_ORDER. For this specific case, we will fall to regular path where the readahead window is determined by BDI's sysfs file (read_ahead_kb).
AI Analysis
Technical Summary
CVE-2024-41031 is a vulnerability identified in the Linux kernel, specifically related to the memory management subsystem's handling of page cache allocation on ARM64 architectures where the base page size is 64KB. The issue arises because the PMD-sized (Page Middle Directory) page cache allocation attempts to create a cache that exceeds the maximum supported page cache order, which the xarray data structure cannot handle properly. This leads to kernel warnings and potentially unstable behavior, as indicated by the kernel warning trace involving functions such as xas_split_alloc and split_huge_page_to_list_to_order. The root cause is that the kernel tries to allocate a PMD-sized page cache when the size is larger than MAX_PAGECACHE_ORDER, which is unsupported by the xarray implementation. The fix implemented involves skipping the allocation of PMD-sized page cache in these cases and instead falling back to the regular page cache allocation path, where the readahead window is controlled by the block device interface's sysfs parameter (read_ahead_kb). This vulnerability affects Linux kernel versions containing the specified commit hashes and is particularly relevant for ARM64 systems using large base page sizes. Although no known exploits are reported in the wild, the vulnerability could cause kernel instability or crashes under specific workloads involving file truncation and fallocate operations, especially on filesystems like XFS that heavily interact with page cache management. The vulnerability does not require user interaction but does require kernel-level code execution, typically from privileged processes or modules interacting with the affected memory management code paths.
Potential Impact
For European organizations, the impact of CVE-2024-41031 primarily concerns systems running Linux on ARM64 hardware with large base page sizes (64KB). This includes servers, embedded devices, and virtualized environments using ARM64 processors. The vulnerability could lead to kernel warnings, instability, or crashes during file operations, potentially causing denial of service conditions on critical infrastructure. Organizations relying on ARM64-based Linux servers for cloud, edge computing, or virtualization workloads could experience service disruptions. Additionally, filesystems like XFS, commonly used in enterprise Linux environments, may be more susceptible to triggering this vulnerability. While there is no evidence of remote exploitation or privilege escalation, the stability issues could impact availability and reliability of services, which is critical for sectors such as finance, healthcare, and telecommunications in Europe. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to maintain system integrity and prevent potential future exploitation or accidental outages.
Mitigation Recommendations
European organizations should apply the Linux kernel patches that address CVE-2024-41031 as soon as they become available from their Linux distribution vendors. Specifically, ensure that kernel versions include the fix that skips PMD-sized page cache allocation when exceeding MAX_PAGECACHE_ORDER on ARM64 architectures. For environments where immediate patching is not feasible, consider the following mitigations: 1) Limit the use of ARM64 systems with 64KB base page sizes for critical workloads until patched; 2) Monitor kernel logs for warnings related to xas_split_alloc or page cache allocation failures to detect potential triggering of this issue; 3) Review and potentially adjust filesystem usage patterns, especially with XFS, to minimize large fallocate or truncate operations that could trigger the vulnerability; 4) Employ robust system monitoring and automated reboot or failover mechanisms to mitigate service disruptions caused by kernel instability; 5) Coordinate with hardware and OS vendors to receive timely updates and guidance. These steps go beyond generic advice by focusing on architecture-specific considerations and operational practices tailored to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2024-41031: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mm/filemap: skip to create PMD-sized page cache if needed On ARM64, HPAGE_PMD_ORDER is 13 when the base page size is 64KB. The PMD-sized page cache can't be supported by xarray as the following error messages indicate. ------------[ cut here ]------------ WARNING: CPU: 35 PID: 7484 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128 Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \ nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \ nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \ ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm \ fuse xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 \ sha1_ce virtio_net net_failover virtio_console virtio_blk failover \ dimlib virtio_mmio CPU: 35 PID: 7484 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #9 Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : xas_split_alloc+0xf8/0x128 lr : split_huge_page_to_list_to_order+0x1c4/0x720 sp : ffff800087a4f6c0 x29: ffff800087a4f6c0 x28: ffff800087a4f720 x27: 000000001fffffff x26: 0000000000000c40 x25: 000000000000000d x24: ffff00010625b858 x23: ffff800087a4f720 x22: ffffffdfc0780000 x21: 0000000000000000 x20: 0000000000000000 x19: ffffffdfc0780000 x18: 000000001ff40000 x17: 00000000ffffffff x16: 0000018000000000 x15: 51ec004000000000 x14: 0000e00000000000 x13: 0000000000002000 x12: 0000000000000020 x11: 51ec000000000000 x10: 51ece1c0ffff8000 x9 : ffffbeb961a44d28 x8 : 0000000000000003 x7 : ffffffdfc0456420 x6 : ffff0000e1aa6eb8 x5 : 20bf08b4fe778fca x4 : ffffffdfc0456420 x3 : 0000000000000c40 x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000 Call trace: xas_split_alloc+0xf8/0x128 split_huge_page_to_list_to_order+0x1c4/0x720 truncate_inode_partial_folio+0xdc/0x160 truncate_inode_pages_range+0x1b4/0x4a8 truncate_pagecache_range+0x84/0xa0 xfs_flush_unmap_range+0x70/0x90 [xfs] xfs_file_fallocate+0xfc/0x4d8 [xfs] vfs_fallocate+0x124/0x2e8 ksys_fallocate+0x4c/0xa0 __arm64_sys_fallocate+0x24/0x38 invoke_syscall.constprop.0+0x7c/0xd8 do_el0_svc+0xb4/0xd0 el0_svc+0x44/0x1d8 el0t_64_sync_handler+0x134/0x150 el0t_64_sync+0x17c/0x180 Fix it by skipping to allocate PMD-sized page cache when its size is larger than MAX_PAGECACHE_ORDER. For this specific case, we will fall to regular path where the readahead window is determined by BDI's sysfs file (read_ahead_kb).
AI-Powered Analysis
Technical Analysis
CVE-2024-41031 is a vulnerability identified in the Linux kernel, specifically related to the memory management subsystem's handling of page cache allocation on ARM64 architectures where the base page size is 64KB. The issue arises because the PMD-sized (Page Middle Directory) page cache allocation attempts to create a cache that exceeds the maximum supported page cache order, which the xarray data structure cannot handle properly. This leads to kernel warnings and potentially unstable behavior, as indicated by the kernel warning trace involving functions such as xas_split_alloc and split_huge_page_to_list_to_order. The root cause is that the kernel tries to allocate a PMD-sized page cache when the size is larger than MAX_PAGECACHE_ORDER, which is unsupported by the xarray implementation. The fix implemented involves skipping the allocation of PMD-sized page cache in these cases and instead falling back to the regular page cache allocation path, where the readahead window is controlled by the block device interface's sysfs parameter (read_ahead_kb). This vulnerability affects Linux kernel versions containing the specified commit hashes and is particularly relevant for ARM64 systems using large base page sizes. Although no known exploits are reported in the wild, the vulnerability could cause kernel instability or crashes under specific workloads involving file truncation and fallocate operations, especially on filesystems like XFS that heavily interact with page cache management. The vulnerability does not require user interaction but does require kernel-level code execution, typically from privileged processes or modules interacting with the affected memory management code paths.
Potential Impact
For European organizations, the impact of CVE-2024-41031 primarily concerns systems running Linux on ARM64 hardware with large base page sizes (64KB). This includes servers, embedded devices, and virtualized environments using ARM64 processors. The vulnerability could lead to kernel warnings, instability, or crashes during file operations, potentially causing denial of service conditions on critical infrastructure. Organizations relying on ARM64-based Linux servers for cloud, edge computing, or virtualization workloads could experience service disruptions. Additionally, filesystems like XFS, commonly used in enterprise Linux environments, may be more susceptible to triggering this vulnerability. While there is no evidence of remote exploitation or privilege escalation, the stability issues could impact availability and reliability of services, which is critical for sectors such as finance, healthcare, and telecommunications in Europe. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to maintain system integrity and prevent potential future exploitation or accidental outages.
Mitigation Recommendations
European organizations should apply the Linux kernel patches that address CVE-2024-41031 as soon as they become available from their Linux distribution vendors. Specifically, ensure that kernel versions include the fix that skips PMD-sized page cache allocation when exceeding MAX_PAGECACHE_ORDER on ARM64 architectures. For environments where immediate patching is not feasible, consider the following mitigations: 1) Limit the use of ARM64 systems with 64KB base page sizes for critical workloads until patched; 2) Monitor kernel logs for warnings related to xas_split_alloc or page cache allocation failures to detect potential triggering of this issue; 3) Review and potentially adjust filesystem usage patterns, especially with XFS, to minimize large fallocate or truncate operations that could trigger the vulnerability; 4) Employ robust system monitoring and automated reboot or failover mechanisms to mitigate service disruptions caused by kernel instability; 5) Coordinate with hardware and OS vendors to receive timely updates and guidance. These steps go beyond generic advice by focusing on architecture-specific considerations and operational practices tailored to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-12T12:17:45.618Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9827c4522896dcbe16cb
Added to database: 5/21/2025, 9:08:55 AM
Last enriched: 6/29/2025, 3:42:23 AM
Last updated: 7/31/2025, 8:37:49 PM
Views: 13
Related Threats
CVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumCVE-2025-9100: Authentication Bypass by Capture-replay in zhenfeng13 My-Blog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.