Skip to main content

CVE-2024-50024: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50024cvecve-2024-50024
Published: Mon Oct 21 2024 (10/21/2024, 19:39:29 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: Fix an unsafe loop on the list The kernel may crash when deleting a genetlink family if there are still listeners for that family: Oops: Kernel access of bad area, sig: 11 [#1] ... NIP [c000000000c080bc] netlink_update_socket_mc+0x3c/0xc0 LR [c000000000c0f764] __netlink_clear_multicast_users+0x74/0xc0 Call Trace: __netlink_clear_multicast_users+0x74/0xc0 genl_unregister_family+0xd4/0x2d0 Change the unsafe loop on the list to a safe one, because inside the loop there is an element removal from this list.

AI-Powered Analysis

AILast updated: 06/28/2025, 16:25:54 UTC

Technical Analysis

CVE-2024-50024 is a vulnerability identified in the Linux kernel related to the handling of genetlink families within the netlink subsystem. Specifically, the issue arises from an unsafe loop construct used when deleting a genetlink family while there are still active listeners registered for that family. The unsafe loop involves iterating over a linked list from which elements are removed during the iteration, leading to a use-after-free or invalid memory access scenario. This results in a kernel crash, evidenced by an 'Oops: Kernel access of bad area, sig: 11' error, indicating a segmentation fault. The crash occurs in the function netlink_update_socket_mc and is triggered during the call to __netlink_clear_multicast_users and finally in the genetlink family unregistration function, genl_unregister_family. The root cause is the unsafe iteration over the list while modifying it, which is a common programming error in kernel code that can lead to memory corruption or system instability. The fix involves changing the unsafe loop to a safe iteration pattern that correctly handles element removal during traversal, preventing the kernel from accessing invalid memory and crashing. This vulnerability affects specific Linux kernel versions identified by the commit hash b8273570f802a7658827dcb077b0b517ba75a289. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions, which are widely used across servers, cloud infrastructure, and embedded devices. A kernel crash can lead to denial of service (DoS), disrupting critical services and operations. In environments where high availability is crucial, such as financial institutions, healthcare providers, and telecommunications, unexpected kernel panics can cause significant operational downtime and potential data loss if systems are not properly configured for resilience. While this vulnerability does not directly allow privilege escalation or remote code execution, the resulting instability could be exploited by local attackers or malicious software to cause service interruptions. Additionally, in multi-tenant cloud environments common in Europe, a kernel crash on a host could affect multiple customers. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to maintain system stability and security posture.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Specifically, they should apply the kernel update that replaces the unsafe loop with a safe iteration pattern in the netlink subsystem. System administrators should audit their environments to identify systems running the affected kernel versions (noted by the commit hash b8273570f802a7658827dcb077b0b517ba75a289) and schedule timely patching. For environments where immediate patching is not feasible, implementing kernel crash monitoring and automated recovery mechanisms can reduce downtime impact. Additionally, restricting local user access and minimizing unnecessary genetlink family registrations can reduce the attack surface. Organizations should also review their incident response plans to handle potential kernel panics and ensure backups and failover systems are operational. Continuous monitoring for unusual kernel crashes or system instability should be enhanced to detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.065Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfd11

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 4:25:54 PM

Last updated: 7/26/2025, 2:23:22 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats