Skip to main content

CVE-2024-42300: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-42300cvecve-2024-42300
Published: Sat Aug 17 2024 (08/17/2024, 09:09:07 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: erofs: fix race in z_erofs_get_gbuf() In z_erofs_get_gbuf(), the current task may be migrated to another CPU between `z_erofs_gbuf_id()` and `spin_lock(&gbuf->lock)`. Therefore, z_erofs_put_gbuf() will trigger the following issue which was found by stress test: <2>[772156.434168] kernel BUG at fs/erofs/zutil.c:58! .. <4>[772156.435007] <4>[772156.439237] CPU: 0 PID: 3078 Comm: stress Kdump: loaded Tainted: G E 6.10.0-rc7+ #2 <4>[772156.439239] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 1.0.0 01/01/2017 <4>[772156.439241] pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) <4>[772156.439243] pc : z_erofs_put_gbuf+0x64/0x70 [erofs] <4>[772156.439252] lr : z_erofs_lz4_decompress+0x600/0x6a0 [erofs] .. <6>[772156.445958] stress (3127): drop_caches: 1 <4>[772156.446120] Call trace: <4>[772156.446121] z_erofs_put_gbuf+0x64/0x70 [erofs] <4>[772156.446761] z_erofs_lz4_decompress+0x600/0x6a0 [erofs] <4>[772156.446897] z_erofs_decompress_queue+0x740/0xa10 [erofs] <4>[772156.447036] z_erofs_runqueue+0x428/0x8c0 [erofs] <4>[772156.447160] z_erofs_readahead+0x224/0x390 [erofs] ..

AI-Powered Analysis

AILast updated: 06/29/2025, 06:56:43 UTC

Technical Analysis

CVE-2024-42300 is a race condition vulnerability identified in the Linux kernel's EROFS (Enhanced Read-Only File System) implementation, specifically within the function z_erofs_get_gbuf(). The vulnerability arises because the current task executing this function may be migrated to another CPU between the invocation of z_erofs_gbuf_id() and acquiring the spin lock on gbuf->lock. This CPU migration without proper synchronization leads to a race condition that can cause kernel instability, including kernel BUGs and potential crashes. The issue manifests during the execution of z_erofs_put_gbuf(), which is called to release or manage buffers within the EROFS decompression routines. The vulnerability was discovered through stress testing and results in kernel panic or BUG messages, as evidenced by the provided kernel logs. The problem affects Linux kernel versions prior to the patch that fixes this race condition. The vulnerability does not appear to have known exploits in the wild yet, and no CVSS score has been assigned. The root cause is improper handling of CPU migration and locking in a critical section of the EROFS decompression code, which can lead to data corruption or denial of service via kernel crashes.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the vulnerable EROFS implementation, especially those using EROFS for read-only filesystem mounts or embedded systems relying on this filesystem. The impact includes potential denial of service due to kernel panics or system crashes, which can disrupt critical services, especially in infrastructure, cloud environments, and embedded devices. Given that Linux is widely used in servers, cloud platforms, and IoT devices across Europe, organizations could face service outages or operational disruptions if exploited or triggered inadvertently. Although no known exploits exist yet, the vulnerability could be leveraged by attackers with local access or through crafted workloads to cause instability. This is particularly concerning for cloud providers, data centers, and enterprises relying on Linux-based infrastructure. Confidentiality and integrity impacts are limited as this is primarily a stability and availability issue, but availability degradation can have significant operational and financial consequences.

Mitigation Recommendations

European organizations should promptly update their Linux kernels to versions that include the patch fixing this race condition in the EROFS code. Since the vulnerability involves kernel-level code, applying official kernel updates from trusted Linux distributions is critical. For environments where immediate patching is not feasible, organizations should consider disabling or avoiding the use of EROFS filesystems until patched. Additionally, monitoring kernel logs for signs of the described kernel BUG or panic messages can help detect attempts to trigger the vulnerability. Stress testing and workload profiling should be reviewed to identify any conditions that might inadvertently cause this race condition. For cloud and virtualized environments, ensure that hypervisor and host kernel versions are also updated. Implementing strict access controls to limit local user access can reduce the risk of exploitation. Finally, maintain robust backup and recovery procedures to mitigate potential downtime caused by kernel crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-30T07:40:12.270Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe1eb1

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 6:56:43 AM

Last updated: 8/18/2025, 7:14:40 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats