Skip to main content

CVE-2024-50009: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50009cvecve-2024-50009
Published: Mon Oct 21 2024 (10/21/2024, 18:54:02 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it and return in case of error. Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI-Powered Analysis

AILast updated: 06/28/2025, 16:11:39 UTC

Technical Analysis

CVE-2024-50009 is a vulnerability identified in the Linux kernel's cpufreq subsystem, specifically within the amd-pstate driver. The issue arises because the function cpufreq_cpu_get, which is used to retrieve CPU frequency scaling information, may return a NULL pointer under certain conditions. The vulnerability occurs due to the lack of a proper NULL check on the return value of cpufreq_cpu_get, leading to a potential NULL pointer dereference. This can cause a kernel panic or system crash, resulting in a denial of service (DoS) condition. The flaw was discovered by the Linux Verification Center using static analysis tools (SVACE) and has been addressed by adding a check for the NULL return value and returning early to avoid dereferencing NULL pointers. The vulnerability affects specific Linux kernel versions identified by commit hashes, and no known exploits are currently reported in the wild. Since the vulnerability is in the kernel's CPU frequency scaling driver, it impacts systems running Linux kernels with the amd-pstate driver enabled, which is typically found on AMD processors. The issue is primarily a stability and availability concern rather than a direct confidentiality or integrity compromise. However, kernel panics can disrupt critical services and workflows, especially in server and enterprise environments.

Potential Impact

For European organizations, the impact of CVE-2024-50009 can be significant in environments relying on Linux servers or workstations with AMD processors where the amd-pstate driver is active. A kernel panic triggered by this vulnerability can cause unexpected system crashes, leading to downtime and potential disruption of business-critical applications and services. This is particularly relevant for sectors such as finance, healthcare, telecommunications, and public administration, where Linux-based infrastructure is prevalent. Although the vulnerability does not directly lead to privilege escalation or data breaches, the resulting denial of service can affect availability and operational continuity. Organizations running high-availability clusters, cloud infrastructure, or edge computing nodes on affected Linux kernels may experience service interruptions. Additionally, the lack of known exploits suggests that the threat is currently low but could increase if attackers develop techniques to trigger the NULL dereference remotely or in automated ways.

Mitigation Recommendations

To mitigate CVE-2024-50009, European organizations should promptly apply the official Linux kernel patches that include the NULL pointer check in the amd-pstate driver. System administrators should: 1) Identify Linux systems running affected kernel versions with the amd-pstate driver enabled, particularly those on AMD hardware. 2) Prioritize patching these systems during the next maintenance window to minimize disruption. 3) Monitor kernel logs and system stability for signs of crashes related to CPU frequency scaling. 4) Consider temporarily disabling the amd-pstate driver if patching is not immediately feasible, although this may impact CPU power management and performance. 5) Incorporate this vulnerability into vulnerability management and incident response plans to ensure rapid detection and remediation. 6) Engage with Linux distribution vendors for updated kernel packages and security advisories. 7) For critical infrastructure, implement redundancy and failover mechanisms to mitigate potential downtime caused by kernel panics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.061Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfc9e

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 4:11:39 PM

Last updated: 7/27/2025, 4:46:03 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats