Skip to main content

CVE-2024-50082: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50082cvecve-2024-50082
Published: Tue Oct 29 2024 (10/29/2024, 00:50:24 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race We're seeing crashes from rq_qos_wake_function that look like this: BUG: unable to handle page fault for address: ffffafe180a40084 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0 Oops: Oops: 0002 [#1] PREEMPT SMP PTI CPU: 17 UID: 0 PID: 0 Comm: swapper/17 Not tainted 6.12.0-rc3-00013-geca631b8fe80 #11 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40 Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 <f0> 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00 RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046 RAX: 0000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011 RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084 RBP: 0000000000000000 R08: 00000000001e7240 R09: 0000000000000011 R10: 0000000000000028 R11: 0000000000000888 R12: 0000000000000002 R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <IRQ> try_to_wake_up+0x5a/0x6a0 rq_qos_wake_function+0x71/0x80 __wake_up_common+0x75/0xa0 __wake_up+0x36/0x60 scale_up.part.0+0x50/0x110 wb_timer_fn+0x227/0x450 ... So rq_qos_wake_function() calls wake_up_process(data->task), which calls try_to_wake_up(), which faults in raw_spin_lock_irqsave(&p->pi_lock). p comes from data->task, and data comes from the waitqueue entry, which is stored on the waiter's stack in rq_qos_wait(). Analyzing the core dump with drgn, I found that the waiter had already woken up and moved on to a completely unrelated code path, clobbering what was previously data->task. Meanwhile, the waker was passing the clobbered garbage in data->task to wake_up_process(), leading to the crash. What's happening is that in between rq_qos_wake_function() deleting the waitqueue entry and calling wake_up_process(), rq_qos_wait() is finding that it already got a token and returning. The race looks like this: rq_qos_wait() rq_qos_wake_function() ============================================================== prepare_to_wait_exclusive() data->got_token = true; list_del_init(&curr->entry); if (data.got_token) break; finish_wait(&rqw->wait, &data.wq); ^- returns immediately because list_empty_careful(&wq_entry->entry) is true ... return, go do something else ... wake_up_process(data->task) (NO LONGER VALID!)-^ Normally, finish_wait() is supposed to synchronize against the waker. But, as noted above, it is returning immediately because the waitqueue entry has already been removed from the waitqueue. The bug is that rq_qos_wake_function() is accessing the waitqueue entry AFTER deleting it. Note that autoremove_wake_function() wakes the waiter and THEN deletes the waitqueue entry, which is the proper order. Fix it by swapping the order. We also need to use list_del_init_careful() to match the list_empty_careful() in finish_wait().

AI-Powered Analysis

AILast updated: 06/28/2025, 17:09:31 UTC

Technical Analysis

CVE-2024-50082 is a race condition vulnerability in the Linux kernel's blk-rq-qos subsystem, specifically involving the interaction between rq_qos_wait() and rq_qos_wake_function(). The vulnerability arises from improper synchronization and ordering when handling waitqueue entries during I/O request queue quality of service (QoS) operations. The root cause is that rq_qos_wake_function() accesses and uses a waitqueue entry after it has been deleted from the waitqueue, leading to use-after-free behavior. This results in a kernel crash due to a page fault triggered by dereferencing invalid memory. The race condition occurs because rq_qos_wait() may return early after the waitqueue entry has been removed, causing the waker function to operate on stale data. The crash manifests as a kernel oops with a supervisor write access fault in kernel mode, indicating a serious stability issue. The fix involves swapping the order of operations in rq_qos_wake_function() to ensure the waitqueue entry is not accessed after deletion and using list_del_init_careful() to properly synchronize with finish_wait(), preventing the race. This vulnerability affects Linux kernel versions around 6.12.0-rc3 and likely other versions using the affected blk-rq-qos code. Although no known exploits are reported in the wild, the flaw can cause denial of service (DoS) through kernel crashes on affected systems under certain I/O workloads.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to servers and infrastructure running Linux kernels with the affected blk-rq-qos code, especially those handling high I/O workloads or using advanced block device QoS features. The impact is mainly a denial of service due to kernel crashes, which can disrupt critical services, cloud infrastructure, and virtualized environments. Organizations relying on Linux-based storage servers, hypervisors, or container hosts may experience unexpected reboots or service interruptions. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the resulting instability can be exploited indirectly to degrade service availability. This is particularly significant for sectors with high uptime requirements such as finance, telecommunications, healthcare, and public administration across Europe. Additionally, the complexity of the bug means that detection and diagnosis may be challenging, potentially delaying remediation and increasing operational risk.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the fix involves kernel code changes, applying official kernel updates from trusted Linux distributions is the most effective mitigation. For environments where immediate patching is not feasible, organizations should monitor kernel logs for oops or crash signatures related to rq_qos_wake_function and blk-rq-qos. Limiting or disabling advanced block device QoS features temporarily may reduce exposure. Additionally, thorough testing of kernel updates in staging environments is recommended to ensure stability. Organizations should also implement robust monitoring and alerting on system crashes and consider deploying redundant systems to maintain availability during potential outages. Coordination with Linux distribution vendors and tracking security advisories is essential to ensure timely patch deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.941Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfebd

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 5:09:31 PM

Last updated: 8/16/2025, 10:13:56 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats