CVE-2024-50093: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: thermal: intel: int340x: processor: Fix warning during module unload The processor_thermal driver uses pcim_device_enable() to enable a PCI device, which means the device will be automatically disabled on driver detach. Thus there is no need to call pci_disable_device() again on it. With recent PCI device resource management improvements, e.g. commit f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is exposed and triggers the warining below. [ 224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device [ 224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100 ... [ 224.010844] Call Trace: [ 224.010845] <TASK> [ 224.010847] ? show_regs+0x6d/0x80 [ 224.010851] ? __warn+0x8c/0x140 [ 224.010854] ? pci_disable_device+0xe5/0x100 [ 224.010856] ? report_bug+0x1c9/0x1e0 [ 224.010859] ? handle_bug+0x46/0x80 [ 224.010862] ? exc_invalid_op+0x1d/0x80 [ 224.010863] ? asm_exc_invalid_op+0x1f/0x30 [ 224.010867] ? pci_disable_device+0xe5/0x100 [ 224.010869] ? pci_disable_device+0xe5/0x100 [ 224.010871] ? kfree+0x21a/0x2b0 [ 224.010873] pcim_disable_device+0x20/0x30 [ 224.010875] devm_action_release+0x16/0x20 [ 224.010878] release_nodes+0x47/0xc0 [ 224.010880] devres_release_all+0x9f/0xe0 [ 224.010883] device_unbind_cleanup+0x12/0x80 [ 224.010885] device_release_driver_internal+0x1ca/0x210 [ 224.010887] driver_detach+0x4e/0xa0 [ 224.010889] bus_remove_driver+0x6f/0xf0 [ 224.010890] driver_unregister+0x35/0x60 [ 224.010892] pci_unregister_driver+0x44/0x90 [ 224.010894] proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci] ... [ 224.010921] ---[ end trace 0000000000000000 ]--- Remove the excess pci_disable_device() calls. [ rjw: Subject and changelog edits ]
AI Analysis
Technical Summary
CVE-2024-50093 addresses a vulnerability in the Linux kernel's processor thermal driver, specifically the intel int340x PCI device driver. The issue arises from improper handling of PCI device resource management during module unload. The processor_thermal driver uses the pcim_device_enable() function to enable the PCI device, which automatically disables the device upon driver detach. However, the driver erroneously calls pci_disable_device() again on an already disabled device. With recent improvements in PCI device resource management, such as the removal of legacy pcim_release() calls, this redundant call triggers kernel warnings and potentially unstable behavior. The warning logs indicate attempts to disable an already disabled device, leading to kernel warnings and call traces that could affect system stability. The root cause is the excess pci_disable_device() calls, which have been removed in the patch to resolve this issue. This vulnerability is primarily a stability and reliability concern rather than a direct security exploit, as it does not appear to allow privilege escalation, code execution, or data leakage. There are no known exploits in the wild, and the vulnerability does not require user interaction or authentication to manifest, but it is triggered during module unload operations related to the processor thermal driver. The affected versions are specific Linux kernel commits identified by their hashes, indicating this is a recent regression or bug introduced in certain kernel versions. No CVSS score is assigned yet, and the vulnerability is published and fixed in the Linux kernel source.
Potential Impact
For European organizations, the impact of CVE-2024-50093 is mainly related to system stability and reliability rather than direct security compromise. Systems running affected Linux kernel versions with the intel int340x processor thermal driver may experience kernel warnings and potential instability during module unload operations. This could lead to unexpected system behavior, crashes, or degraded performance in environments where thermal management is critical, such as data centers, cloud infrastructure, and industrial control systems. Organizations relying on Linux servers for critical workloads might face increased maintenance overhead and potential downtime if the issue is triggered frequently. However, since there is no indication of privilege escalation or remote code execution, the risk of data breach or system takeover is low. The vulnerability could indirectly affect availability if kernel stability issues cause reboots or service interruptions. European entities with large Linux deployments, particularly those using Intel processors with the affected driver, should prioritize patching to maintain operational stability.
Mitigation Recommendations
To mitigate CVE-2024-50093, European organizations should: 1) Identify Linux systems running affected kernel versions, especially those utilizing Intel processors with the int340x processor thermal driver. 2) Apply the latest Linux kernel updates or patches that remove the redundant pci_disable_device() calls as soon as they become available from trusted Linux distributions or kernel maintainers. 3) Monitor kernel logs for warnings related to pci_disable_device() to detect potential occurrences of this issue. 4) In environments where kernel updates are delayed, consider temporarily disabling or unloading the processor_thermal_pci driver if thermal management can be safely handled by alternative means, though this may impact thermal monitoring. 5) Test kernel updates in staging environments to ensure compatibility and stability before widespread deployment. 6) Maintain robust backup and recovery procedures to minimize downtime in case of kernel instability. These steps go beyond generic advice by focusing on driver-specific monitoring and controlled deployment of kernel patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-50093: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: thermal: intel: int340x: processor: Fix warning during module unload The processor_thermal driver uses pcim_device_enable() to enable a PCI device, which means the device will be automatically disabled on driver detach. Thus there is no need to call pci_disable_device() again on it. With recent PCI device resource management improvements, e.g. commit f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is exposed and triggers the warining below. [ 224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device [ 224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100 ... [ 224.010844] Call Trace: [ 224.010845] <TASK> [ 224.010847] ? show_regs+0x6d/0x80 [ 224.010851] ? __warn+0x8c/0x140 [ 224.010854] ? pci_disable_device+0xe5/0x100 [ 224.010856] ? report_bug+0x1c9/0x1e0 [ 224.010859] ? handle_bug+0x46/0x80 [ 224.010862] ? exc_invalid_op+0x1d/0x80 [ 224.010863] ? asm_exc_invalid_op+0x1f/0x30 [ 224.010867] ? pci_disable_device+0xe5/0x100 [ 224.010869] ? pci_disable_device+0xe5/0x100 [ 224.010871] ? kfree+0x21a/0x2b0 [ 224.010873] pcim_disable_device+0x20/0x30 [ 224.010875] devm_action_release+0x16/0x20 [ 224.010878] release_nodes+0x47/0xc0 [ 224.010880] devres_release_all+0x9f/0xe0 [ 224.010883] device_unbind_cleanup+0x12/0x80 [ 224.010885] device_release_driver_internal+0x1ca/0x210 [ 224.010887] driver_detach+0x4e/0xa0 [ 224.010889] bus_remove_driver+0x6f/0xf0 [ 224.010890] driver_unregister+0x35/0x60 [ 224.010892] pci_unregister_driver+0x44/0x90 [ 224.010894] proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci] ... [ 224.010921] ---[ end trace 0000000000000000 ]--- Remove the excess pci_disable_device() calls. [ rjw: Subject and changelog edits ]
AI-Powered Analysis
Technical Analysis
CVE-2024-50093 addresses a vulnerability in the Linux kernel's processor thermal driver, specifically the intel int340x PCI device driver. The issue arises from improper handling of PCI device resource management during module unload. The processor_thermal driver uses the pcim_device_enable() function to enable the PCI device, which automatically disables the device upon driver detach. However, the driver erroneously calls pci_disable_device() again on an already disabled device. With recent improvements in PCI device resource management, such as the removal of legacy pcim_release() calls, this redundant call triggers kernel warnings and potentially unstable behavior. The warning logs indicate attempts to disable an already disabled device, leading to kernel warnings and call traces that could affect system stability. The root cause is the excess pci_disable_device() calls, which have been removed in the patch to resolve this issue. This vulnerability is primarily a stability and reliability concern rather than a direct security exploit, as it does not appear to allow privilege escalation, code execution, or data leakage. There are no known exploits in the wild, and the vulnerability does not require user interaction or authentication to manifest, but it is triggered during module unload operations related to the processor thermal driver. The affected versions are specific Linux kernel commits identified by their hashes, indicating this is a recent regression or bug introduced in certain kernel versions. No CVSS score is assigned yet, and the vulnerability is published and fixed in the Linux kernel source.
Potential Impact
For European organizations, the impact of CVE-2024-50093 is mainly related to system stability and reliability rather than direct security compromise. Systems running affected Linux kernel versions with the intel int340x processor thermal driver may experience kernel warnings and potential instability during module unload operations. This could lead to unexpected system behavior, crashes, or degraded performance in environments where thermal management is critical, such as data centers, cloud infrastructure, and industrial control systems. Organizations relying on Linux servers for critical workloads might face increased maintenance overhead and potential downtime if the issue is triggered frequently. However, since there is no indication of privilege escalation or remote code execution, the risk of data breach or system takeover is low. The vulnerability could indirectly affect availability if kernel stability issues cause reboots or service interruptions. European entities with large Linux deployments, particularly those using Intel processors with the affected driver, should prioritize patching to maintain operational stability.
Mitigation Recommendations
To mitigate CVE-2024-50093, European organizations should: 1) Identify Linux systems running affected kernel versions, especially those utilizing Intel processors with the int340x processor thermal driver. 2) Apply the latest Linux kernel updates or patches that remove the redundant pci_disable_device() calls as soon as they become available from trusted Linux distributions or kernel maintainers. 3) Monitor kernel logs for warnings related to pci_disable_device() to detect potential occurrences of this issue. 4) In environments where kernel updates are delayed, consider temporarily disabling or unloading the processor_thermal_pci driver if thermal management can be safely handled by alternative means, though this may impact thermal monitoring. 5) Test kernel updates in staging environments to ensure compatibility and stability before widespread deployment. 6) Maintain robust backup and recovery procedures to minimize downtime in case of kernel instability. These steps go beyond generic advice by focusing on driver-specific monitoring and controlled deployment of kernel patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.943Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfef3
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 5:10:35 PM
Last updated: 7/28/2025, 6:48:18 AM
Views: 11
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.