CVE-2024-42300: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: erofs: fix race in z_erofs_get_gbuf() In z_erofs_get_gbuf(), the current task may be migrated to another CPU between `z_erofs_gbuf_id()` and `spin_lock(&gbuf->lock)`. Therefore, z_erofs_put_gbuf() will trigger the following issue which was found by stress test: <2>[772156.434168] kernel BUG at fs/erofs/zutil.c:58! .. <4>[772156.435007] <4>[772156.439237] CPU: 0 PID: 3078 Comm: stress Kdump: loaded Tainted: G E 6.10.0-rc7+ #2 <4>[772156.439239] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 1.0.0 01/01/2017 <4>[772156.439241] pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) <4>[772156.439243] pc : z_erofs_put_gbuf+0x64/0x70 [erofs] <4>[772156.439252] lr : z_erofs_lz4_decompress+0x600/0x6a0 [erofs] .. <6>[772156.445958] stress (3127): drop_caches: 1 <4>[772156.446120] Call trace: <4>[772156.446121] z_erofs_put_gbuf+0x64/0x70 [erofs] <4>[772156.446761] z_erofs_lz4_decompress+0x600/0x6a0 [erofs] <4>[772156.446897] z_erofs_decompress_queue+0x740/0xa10 [erofs] <4>[772156.447036] z_erofs_runqueue+0x428/0x8c0 [erofs] <4>[772156.447160] z_erofs_readahead+0x224/0x390 [erofs] ..
AI Analysis
Technical Summary
CVE-2024-42300 is a race condition vulnerability identified in the Linux kernel's EROFS (Enhanced Read-Only File System) implementation, specifically within the function z_erofs_get_gbuf(). The vulnerability arises because the current task executing this function may be migrated to another CPU between the invocation of z_erofs_gbuf_id() and acquiring the spin lock on gbuf->lock. This CPU migration without proper synchronization leads to a race condition that can cause kernel instability, including kernel BUGs and potential crashes. The issue manifests during the execution of z_erofs_put_gbuf(), which is called to release or manage buffers within the EROFS decompression routines. The vulnerability was discovered through stress testing and results in kernel panic or BUG messages, as evidenced by the provided kernel logs. The problem affects Linux kernel versions prior to the patch that fixes this race condition. The vulnerability does not appear to have known exploits in the wild yet, and no CVSS score has been assigned. The root cause is improper handling of CPU migration and locking in a critical section of the EROFS decompression code, which can lead to data corruption or denial of service via kernel crashes.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the vulnerable EROFS implementation, especially those using EROFS for read-only filesystem mounts or embedded systems relying on this filesystem. The impact includes potential denial of service due to kernel panics or system crashes, which can disrupt critical services, especially in infrastructure, cloud environments, and embedded devices. Given that Linux is widely used in servers, cloud platforms, and IoT devices across Europe, organizations could face service outages or operational disruptions if exploited or triggered inadvertently. Although no known exploits exist yet, the vulnerability could be leveraged by attackers with local access or through crafted workloads to cause instability. This is particularly concerning for cloud providers, data centers, and enterprises relying on Linux-based infrastructure. Confidentiality and integrity impacts are limited as this is primarily a stability and availability issue, but availability degradation can have significant operational and financial consequences.
Mitigation Recommendations
European organizations should promptly update their Linux kernels to versions that include the patch fixing this race condition in the EROFS code. Since the vulnerability involves kernel-level code, applying official kernel updates from trusted Linux distributions is critical. For environments where immediate patching is not feasible, organizations should consider disabling or avoiding the use of EROFS filesystems until patched. Additionally, monitoring kernel logs for signs of the described kernel BUG or panic messages can help detect attempts to trigger the vulnerability. Stress testing and workload profiling should be reviewed to identify any conditions that might inadvertently cause this race condition. For cloud and virtualized environments, ensure that hypervisor and host kernel versions are also updated. Implementing strict access controls to limit local user access can reduce the risk of exploitation. Finally, maintain robust backup and recovery procedures to mitigate potential downtime caused by kernel crashes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Italy, Spain
CVE-2024-42300: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: erofs: fix race in z_erofs_get_gbuf() In z_erofs_get_gbuf(), the current task may be migrated to another CPU between `z_erofs_gbuf_id()` and `spin_lock(&gbuf->lock)`. Therefore, z_erofs_put_gbuf() will trigger the following issue which was found by stress test: <2>[772156.434168] kernel BUG at fs/erofs/zutil.c:58! .. <4>[772156.435007] <4>[772156.439237] CPU: 0 PID: 3078 Comm: stress Kdump: loaded Tainted: G E 6.10.0-rc7+ #2 <4>[772156.439239] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 1.0.0 01/01/2017 <4>[772156.439241] pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) <4>[772156.439243] pc : z_erofs_put_gbuf+0x64/0x70 [erofs] <4>[772156.439252] lr : z_erofs_lz4_decompress+0x600/0x6a0 [erofs] .. <6>[772156.445958] stress (3127): drop_caches: 1 <4>[772156.446120] Call trace: <4>[772156.446121] z_erofs_put_gbuf+0x64/0x70 [erofs] <4>[772156.446761] z_erofs_lz4_decompress+0x600/0x6a0 [erofs] <4>[772156.446897] z_erofs_decompress_queue+0x740/0xa10 [erofs] <4>[772156.447036] z_erofs_runqueue+0x428/0x8c0 [erofs] <4>[772156.447160] z_erofs_readahead+0x224/0x390 [erofs] ..
AI-Powered Analysis
Technical Analysis
CVE-2024-42300 is a race condition vulnerability identified in the Linux kernel's EROFS (Enhanced Read-Only File System) implementation, specifically within the function z_erofs_get_gbuf(). The vulnerability arises because the current task executing this function may be migrated to another CPU between the invocation of z_erofs_gbuf_id() and acquiring the spin lock on gbuf->lock. This CPU migration without proper synchronization leads to a race condition that can cause kernel instability, including kernel BUGs and potential crashes. The issue manifests during the execution of z_erofs_put_gbuf(), which is called to release or manage buffers within the EROFS decompression routines. The vulnerability was discovered through stress testing and results in kernel panic or BUG messages, as evidenced by the provided kernel logs. The problem affects Linux kernel versions prior to the patch that fixes this race condition. The vulnerability does not appear to have known exploits in the wild yet, and no CVSS score has been assigned. The root cause is improper handling of CPU migration and locking in a critical section of the EROFS decompression code, which can lead to data corruption or denial of service via kernel crashes.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the vulnerable EROFS implementation, especially those using EROFS for read-only filesystem mounts or embedded systems relying on this filesystem. The impact includes potential denial of service due to kernel panics or system crashes, which can disrupt critical services, especially in infrastructure, cloud environments, and embedded devices. Given that Linux is widely used in servers, cloud platforms, and IoT devices across Europe, organizations could face service outages or operational disruptions if exploited or triggered inadvertently. Although no known exploits exist yet, the vulnerability could be leveraged by attackers with local access or through crafted workloads to cause instability. This is particularly concerning for cloud providers, data centers, and enterprises relying on Linux-based infrastructure. Confidentiality and integrity impacts are limited as this is primarily a stability and availability issue, but availability degradation can have significant operational and financial consequences.
Mitigation Recommendations
European organizations should promptly update their Linux kernels to versions that include the patch fixing this race condition in the EROFS code. Since the vulnerability involves kernel-level code, applying official kernel updates from trusted Linux distributions is critical. For environments where immediate patching is not feasible, organizations should consider disabling or avoiding the use of EROFS filesystems until patched. Additionally, monitoring kernel logs for signs of the described kernel BUG or panic messages can help detect attempts to trigger the vulnerability. Stress testing and workload profiling should be reviewed to identify any conditions that might inadvertently cause this race condition. For cloud and virtualized environments, ensure that hypervisor and host kernel versions are also updated. Implementing strict access controls to limit local user access can reduce the risk of exploitation. Finally, maintain robust backup and recovery procedures to mitigate potential downtime caused by kernel crashes.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-30T07:40:12.270Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe1eb1
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 6:56:43 AM
Last updated: 8/18/2025, 7:14:40 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.