Skip to main content

CVE-2024-46735: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-46735cvecve-2024-46735
Published: Wed Sep 18 2024 (09/18/2024, 07:11:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() When two UBLK_CMD_START_USER_RECOVERY commands are submitted, the first one sets 'ubq->ubq_daemon' to NULL, and the second one triggers WARN in ublk_queue_reinit() and subsequently a NULL pointer dereference issue. Fix it by adding the check in ublk_ctrl_start_recovery() and return immediately in case of zero 'ub->nr_queues_ready'. BUG: kernel NULL pointer dereference, address: 0000000000000028 RIP: 0010:ublk_ctrl_start_recovery.constprop.0+0x82/0x180 Call Trace: <TASK> ? __die+0x20/0x70 ? page_fault_oops+0x75/0x170 ? exc_page_fault+0x64/0x140 ? asm_exc_page_fault+0x22/0x30 ? ublk_ctrl_start_recovery.constprop.0+0x82/0x180 ublk_ctrl_uring_cmd+0x4f7/0x6c0 ? pick_next_task_idle+0x26/0x40 io_uring_cmd+0x9a/0x1b0 io_issue_sqe+0x193/0x3f0 io_wq_submit_work+0x9b/0x390 io_worker_handle_work+0x165/0x360 io_wq_worker+0xcb/0x2f0 ? finish_task_switch.isra.0+0x203/0x290 ? finish_task_switch.isra.0+0x203/0x290 ? __pfx_io_wq_worker+0x10/0x10 ret_from_fork+0x2d/0x50 ? __pfx_io_wq_worker+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK>

AI-Powered Analysis

AILast updated: 06/29/2025, 01:09:37 UTC

Technical Analysis

CVE-2024-46735 is a vulnerability identified in the Linux kernel's ublk (user block) driver, specifically within the function ublk_ctrl_start_recovery(). The issue arises when two UBLK_CMD_START_USER_RECOVERY commands are submitted sequentially. The first command sets the 'ubq->ubq_daemon' pointer to NULL, and the second command triggers a warning in ublk_queue_reinit(), which leads to a NULL pointer dereference. This dereference causes a kernel BUG, resulting in a kernel panic or system crash. The root cause is the lack of a proper check for the number of ready queues ('ub->nr_queues_ready') before proceeding with recovery operations. The fix involves adding a conditional check in ublk_ctrl_start_recovery() to immediately return if 'ub->nr_queues_ready' is zero, preventing the NULL pointer dereference. The vulnerability is triggered through the io_uring interface, which is a modern asynchronous I/O interface in Linux, indicating that user-space processes with access to io_uring commands can exploit this flaw to cause a denial of service (DoS) by crashing the kernel. The vulnerability does not require privilege escalation but does require the ability to submit specific io_uring commands, which may be restricted by system policies. No known exploits in the wild have been reported at the time of publication. The vulnerability affects specific Linux kernel versions identified by commit hashes, implying it is present in certain recent kernel builds prior to the patch. This vulnerability is a classic example of a NULL pointer dereference leading to kernel panic, which impacts system availability and stability.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to servers and systems running vulnerable Linux kernel versions with io_uring enabled and accessible to untrusted or semi-trusted users. The impact is a denial of service through kernel crashes, which can disrupt critical services, cause downtime, and potentially lead to data loss if systems are abruptly rebooted. Organizations relying on Linux-based infrastructure for web hosting, cloud services, or internal applications could experience service interruptions. The vulnerability does not directly lead to privilege escalation or data leakage but can be leveraged as part of a broader attack chain to disrupt operations. Given the widespread use of Linux in European data centers, cloud providers, and enterprise environments, the potential for disruption is significant, especially in sectors requiring high availability such as finance, healthcare, and telecommunications. Additionally, the use of io_uring is increasing due to its performance benefits, which may increase the attack surface. However, the requirement to submit specific io_uring commands may limit exploitation to environments where users have sufficient access rights or where containerized or multi-tenant environments expose io_uring interfaces.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2024-46735 as soon as they become available from trusted sources or Linux distribution maintainers. 2. Restrict access to io_uring interfaces by limiting which users or processes can submit io_uring commands, using Linux security modules (e.g., SELinux, AppArmor) or cgroup restrictions. 3. Monitor kernel logs for WARN messages related to ublk_queue_reinit() or unexpected kernel panics that could indicate attempted exploitation. 4. In multi-tenant or containerized environments, isolate workloads and minimize privileges to prevent untrusted users from accessing io_uring interfaces. 5. Consider disabling io_uring if it is not required for critical applications, especially on systems exposed to untrusted users. 6. Implement robust system monitoring and automated reboot procedures to minimize downtime in case of crashes. 7. Engage with Linux distribution vendors for timely updates and verify kernel versions in use to ensure they are not vulnerable. 8. Conduct internal audits to identify systems with vulnerable kernel versions and prioritize patching based on exposure and criticality.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.257Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe114a

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/29/2025, 1:09:37 AM

Last updated: 7/30/2025, 7:37:05 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats