Skip to main content

CVE-2024-50032: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50032cvecve-2024-50032
Published: Mon Oct 21 2024 (10/21/2024, 19:39:34 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: rcu/nocb: Fix rcuog wake-up from offline softirq After a CPU has set itself offline and before it eventually calls rcutree_report_cpu_dead(), there are still opportunities for callbacks to be enqueued, for example from a softirq. When that happens on NOCB, the rcuog wake-up is deferred through an IPI to an online CPU in order not to call into the scheduler and risk arming the RT-bandwidth after hrtimers have been migrated out and disabled. But performing a synchronized IPI from a softirq is buggy as reported in the following scenario: WARNING: CPU: 1 PID: 26 at kernel/smp.c:633 smp_call_function_single Modules linked in: rcutorture torture CPU: 1 UID: 0 PID: 26 Comm: migration/1 Not tainted 6.11.0-rc1-00012-g9139f93209d1 #1 Stopper: multi_cpu_stop+0x0/0x320 <- __stop_cpus+0xd0/0x120 RIP: 0010:smp_call_function_single <IRQ> swake_up_one_online __call_rcu_nocb_wake __call_rcu_common ? rcu_torture_one_read call_timer_fn __run_timers run_timer_softirq handle_softirqs irq_exit_rcu ? tick_handle_periodic sysvec_apic_timer_interrupt </IRQ> Fix this with forcing deferred rcuog wake up through the NOCB timer when the CPU is offline. The actual wake up will happen from rcutree_report_cpu_dead().

AI-Powered Analysis

AILast updated: 06/27/2025, 21:42:37 UTC

Technical Analysis

CVE-2024-50032 is a vulnerability in the Linux kernel related to the Read-Copy-Update (RCU) subsystem, specifically in the handling of RCU callbacks when CPUs are taken offline. The issue arises in the 'rcu/nocb' (no callback) mechanism, which defers RCU callback processing to avoid scheduler interference and real-time bandwidth issues. The vulnerability occurs because after a CPU sets itself offline but before it calls rcutree_report_cpu_dead(), callbacks can still be enqueued, for example from a softirq context. The intended behavior is to defer the RCU offloaded (rcuog) wake-up via an inter-processor interrupt (IPI) to an online CPU. However, performing a synchronized IPI from a softirq context is buggy and can lead to kernel warnings or potential instability, as demonstrated by the provided kernel warning trace. This can cause issues such as deadlocks or system instability during CPU offline transitions. The fix involves forcing the deferred rcuog wake-up through the NOCB timer when the CPU is offline, ensuring the wake-up happens safely from rcutree_report_cpu_dead(), thus avoiding the problematic synchronized IPI call from softirq context. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes and was published on October 21, 2024. No known exploits are reported in the wild yet, and no CVSS score has been assigned.

Potential Impact

For European organizations, this vulnerability primarily threatens the stability and reliability of Linux-based systems, especially those that frequently manage CPU hotplugging or offline transitions, such as cloud infrastructure, data centers, and high-availability servers. While it does not directly expose confidentiality or integrity risks, the potential for kernel warnings, deadlocks, or crashes can lead to denial of service (DoS) conditions. This can disrupt critical services, cause downtime, and impact business continuity. Organizations relying on Linux for real-time or performance-sensitive applications may experience degraded performance or unexpected system behavior. Given Linux's widespread use in European enterprise environments, including government, finance, telecommunications, and manufacturing sectors, the operational impact could be significant if unpatched. However, the lack of known exploits and the technical nature of the issue somewhat limits immediate risk, but it remains a concern for system stability and uptime.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2024-50032 as soon as it becomes available. Until patches are applied, system administrators should monitor kernel logs for warnings related to smp_call_function_single or RCU callbacks during CPU offline events. Avoid frequent CPU hotplug operations if possible, or schedule them during maintenance windows to minimize impact. For environments using custom or long-term support kernels, backporting the patch is recommended. Additionally, organizations should implement robust monitoring and alerting on kernel stability metrics and consider deploying redundant systems to mitigate potential downtime. Engaging with Linux distribution vendors for timely updates and verifying kernel versions against the affected commits is critical. Finally, testing kernel updates in staging environments before production deployment will help ensure stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.069Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdcee4

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 9:42:37 PM

Last updated: 8/6/2025, 9:25:42 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats