Skip to main content

CVE-2024-50065: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50065cvecve-2024-50065
Published: Mon Oct 21 2024 (10/21/2024, 19:39:53 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ntfs3: Change to non-blocking allocation in ntfs_d_hash d_hash is done while under "rcu-walk" and should not sleep. __get_name() allocates using GFP_KERNEL, having the possibility to sleep when under memory pressure. Change the allocation to GFP_NOWAIT.

AI-Powered Analysis

AILast updated: 06/27/2025, 21:55:03 UTC

Technical Analysis

CVE-2024-50065 is a vulnerability identified in the Linux kernel specifically related to the NTFS3 filesystem driver. The issue arises from the way memory allocation is handled during the execution of the ntfs_d_hash function, which is performed under an "rcu-walk" context. In this context, sleeping operations are prohibited because they can cause deadlocks or other synchronization issues. The vulnerability stems from the use of the __get_name() function, which internally allocates memory using GFP_KERNEL flags. GFP_KERNEL allocations can sleep if the system is under memory pressure, violating the non-blocking requirement of the rcu-walk context. The fix involves changing the allocation flag to GFP_NOWAIT, which ensures that the allocation does not sleep and thus maintains the non-blocking behavior required. Although no known exploits are currently reported in the wild, this vulnerability could potentially lead to kernel instability or denial of service (DoS) conditions if exploited, as sleeping in an inappropriate context can cause kernel panics or hangs. The affected versions are specific Linux kernel commits identified by their hashes, indicating that this is a recent and targeted fix. The vulnerability does not have an assigned CVSS score yet but has been published and enriched by CISA, indicating recognition by authoritative cybersecurity bodies.

Potential Impact

For European organizations, the impact of CVE-2024-50065 primarily concerns systems running Linux kernels with the vulnerable NTFS3 driver, especially those that mount NTFS filesystems. This includes servers, workstations, and embedded devices that rely on NTFS for storage or interoperability with Windows systems. The main risk is kernel instability or denial of service, which can disrupt critical services, cause data unavailability, and require system reboots or recovery procedures. Organizations with mixed OS environments or those using NTFS-formatted external drives or network shares are particularly at risk. While this vulnerability does not directly lead to privilege escalation or data leakage, the resulting system crashes or hangs can impact business continuity, especially in sectors like finance, healthcare, and critical infrastructure prevalent in Europe. Additionally, the lack of known exploits suggests that attackers may not yet be actively targeting this vulnerability, but the potential for future exploitation exists once the vulnerability details become widely known.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch changing the allocation from GFP_KERNEL to GFP_NOWAIT in the ntfs_d_hash function. Since the vulnerability is related to kernel-level memory allocation, kernel updates are the definitive fix. Organizations should audit their systems to identify those running vulnerable kernel versions and assess the usage of NTFS filesystems. Where immediate patching is not feasible, organizations can consider limiting the use of NTFS mounts or isolating affected systems to reduce exposure. Monitoring kernel logs for unusual panics or hangs related to NTFS operations can help detect potential exploitation attempts. Additionally, organizations should ensure robust backup and recovery procedures are in place to mitigate the impact of potential denial of service incidents. Coordination with Linux distribution vendors for timely patch deployment and testing in staging environments before production rollout is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.939Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdcef8

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 9:55:03 PM

Last updated: 8/14/2025, 5:50:45 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats