Skip to main content

CVE-2024-46744: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-46744cvecve-2024-46744
Published: Wed Sep 18 2024 (09/18/2024, 07:12:04 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Squashfs: sanity check symbolic link size Syzkiller reports a "KMSAN: uninit-value in pick_link" bug. This is caused by an uninitialised page, which is ultimately caused by a corrupted symbolic link size read from disk. The reason why the corrupted symlink size causes an uninitialised page is due to the following sequence of events: 1. squashfs_read_inode() is called to read the symbolic link from disk. This assigns the corrupted value 3875536935 to inode->i_size. 2. Later squashfs_symlink_read_folio() is called, which assigns this corrupted value to the length variable, which being a signed int, overflows producing a negative number. 3. The following loop that fills in the page contents checks that the copied bytes is less than length, which being negative means the loop is skipped, producing an uninitialised page. This patch adds a sanity check which checks that the symbolic link size is not larger than expected. -- V2: fix spelling mistake.

AI-Powered Analysis

AILast updated: 06/29/2025, 01:11:00 UTC

Technical Analysis

CVE-2024-46744 is a vulnerability identified in the Linux kernel's handling of Squashfs symbolic links. Squashfs is a compressed read-only filesystem commonly used in embedded systems, live Linux distributions, and container images. The vulnerability arises from improper validation of the symbolic link size read from disk. Specifically, when the kernel function squashfs_read_inode() reads a corrupted symbolic link size, it assigns an abnormally large value (e.g., 3875536935) to the inode's i_size field. Subsequently, squashfs_symlink_read_folio() uses this corrupted size as a signed integer length variable. Due to integer overflow, this length becomes negative, causing a loop that should copy symbolic link data into a page to be skipped. As a result, the page remains uninitialized, leading to a use of uninitialized memory. This uninitialized memory usage can cause unpredictable behavior including potential information leakage, kernel crashes, or memory corruption. The patch for this vulnerability introduces a sanity check to ensure the symbolic link size does not exceed expected limits, preventing the overflow and uninitialized memory condition. No known exploits are currently reported in the wild, and the vulnerability was published shortly after being reserved, indicating a proactive disclosure. The vulnerability affects Linux kernel versions containing the specified commit hashes prior to patching. Given that Squashfs is widely used in various Linux distributions and embedded devices, this vulnerability has broad implications for systems relying on this filesystem.

Potential Impact

For European organizations, the impact of CVE-2024-46744 can be significant depending on their use of Linux systems that utilize Squashfs. Many European enterprises and public sector organizations deploy Linux-based servers, network appliances, and embedded devices that may use Squashfs for firmware or container images. Exploitation could lead to kernel crashes causing denial of service, or potentially memory corruption that might be leveraged for privilege escalation or information disclosure. Critical infrastructure sectors such as telecommunications, manufacturing, and transportation that rely on embedded Linux devices are particularly at risk. Additionally, cloud service providers and data centers in Europe running Linux containers or live images with Squashfs could face service disruptions or security breaches. Although no exploits are currently known, the vulnerability's nature—uninitialized memory usage triggered by corrupted symbolic link data—could be weaponized by attackers with local access or through crafted filesystem images. This elevates the risk for organizations that allow untrusted users to mount or interact with Squashfs images. The impact on confidentiality, integrity, and availability varies but could be severe if exploited in sensitive environments.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2024-46744. Specifically, applying the latest stable kernel releases or vendor-provided security updates that incorporate the symbolic link size sanity check is critical. For embedded devices and appliances, vendors should be contacted to obtain firmware updates addressing this issue. Organizations should audit their use of Squashfs images, especially those sourced externally or from untrusted origins, and restrict mounting or processing of such images to trusted administrators. Implementing strict access controls and monitoring for unusual kernel crashes or memory errors related to Squashfs can help detect exploitation attempts. Additionally, sandboxing or isolating processes that handle Squashfs images reduces the risk of privilege escalation. For containerized environments, rebuilding container images with patched kernels and verifying the integrity of Squashfs layers is recommended. Finally, organizations should maintain robust incident response plans to address potential exploitation scenarios involving kernel memory corruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.266Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe1189

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/29/2025, 1:11:00 AM

Last updated: 7/30/2025, 1:33:06 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats