Skip to main content

CVE-2024-47731: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-47731cvecve-2024-47731
Published: Mon Oct 21 2024 (10/21/2024, 12:14:03 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing The alibaba_uncore_pmu driver forgot to clear all interrupt status in the interrupt processing function. After the PMU counter overflow interrupt occurred, an interrupt storm occurred, causing the system to hang. Therefore, clear the correct interrupt status in the interrupt handling function to fix it.

AI-Powered Analysis

AILast updated: 06/28/2025, 20:10:53 UTC

Technical Analysis

CVE-2024-47731 is a vulnerability identified in the Linux kernel specifically within the ali_drw_pmu driver, which is part of the performance monitoring unit (PMU) drivers. The issue arises because the alibaba_uncore_pmu driver fails to clear all interrupt status flags during its interrupt processing routine. When a PMU counter overflow interrupt occurs, the driver neglects to clear the interrupt status properly, leading to an interrupt storm—an excessive and continuous generation of interrupts. This storm can overwhelm the system's interrupt handling capabilities, causing the system to hang or become unresponsive. The root cause is a missing or incomplete clearing of interrupt status bits in the interrupt handler function. The fix involves ensuring that the correct interrupt status bits are cleared during interrupt processing to prevent the storm and maintain system stability. This vulnerability affects specific versions of the Linux kernel identified by the commit hash cf7b61073e4526caa247616f6fbb174cbd2a5366. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability is technical and low-level, impacting kernel stability rather than directly exposing data confidentiality or integrity. However, system availability is at risk due to potential hangs caused by the interrupt storm.

Potential Impact

For European organizations, the primary impact of CVE-2024-47731 is on system availability and stability. Systems running affected Linux kernel versions with the ali_drw_pmu driver enabled may experience hangs or crashes due to interrupt storms triggered by PMU counter overflow interrupts. This can disrupt critical services, especially in environments relying on Linux for servers, embedded systems, or performance monitoring tasks. Industries such as telecommunications, finance, manufacturing, and cloud service providers that use Linux-based infrastructure could face operational downtime or degraded performance. Although the vulnerability does not directly compromise data confidentiality or integrity, the denial-of-service-like effect can lead to significant business interruptions and potential financial losses. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the interrupt storm. European organizations with customized or Alibaba hardware platforms that utilize the ali_drw_pmu driver are particularly at risk. The vulnerability also highlights the importance of maintaining up-to-date kernel versions and monitoring kernel driver behavior in production environments.

Mitigation Recommendations

To mitigate CVE-2024-47731, European organizations should: 1) Apply the official Linux kernel patch that corrects the interrupt status clearing in the ali_drw_pmu driver as soon as it becomes available. This is the definitive fix to prevent the interrupt storm condition. 2) Identify and inventory all systems running the affected Linux kernel versions and verify if the ali_drw_pmu driver is in use, especially on Alibaba hardware or platforms that may include this driver. 3) Implement kernel update policies that prioritize security patches for critical kernel components, including device drivers. 4) Monitor system logs and performance metrics for signs of interrupt storms or unusual interrupt activity that could indicate attempts to trigger this vulnerability. 5) For systems where immediate patching is not feasible, consider disabling the ali_drw_pmu driver if it is not essential to operations, to prevent the vulnerability from being triggered. 6) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and support for this vulnerability. 7) Incorporate this vulnerability into incident response and system hardening checklists to ensure awareness and readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-30T16:00:12.957Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe060f

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 8:10:53 PM

Last updated: 7/31/2025, 6:03:51 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats