Skip to main content

CVE-2024-50093: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50093cvecve-2024-50093
Published: Tue Nov 05 2024 (11/05/2024, 17:04:56 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: thermal: intel: int340x: processor: Fix warning during module unload The processor_thermal driver uses pcim_device_enable() to enable a PCI device, which means the device will be automatically disabled on driver detach. Thus there is no need to call pci_disable_device() again on it. With recent PCI device resource management improvements, e.g. commit f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is exposed and triggers the warining below. [ 224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device [ 224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100 ... [ 224.010844] Call Trace: [ 224.010845] <TASK> [ 224.010847] ? show_regs+0x6d/0x80 [ 224.010851] ? __warn+0x8c/0x140 [ 224.010854] ? pci_disable_device+0xe5/0x100 [ 224.010856] ? report_bug+0x1c9/0x1e0 [ 224.010859] ? handle_bug+0x46/0x80 [ 224.010862] ? exc_invalid_op+0x1d/0x80 [ 224.010863] ? asm_exc_invalid_op+0x1f/0x30 [ 224.010867] ? pci_disable_device+0xe5/0x100 [ 224.010869] ? pci_disable_device+0xe5/0x100 [ 224.010871] ? kfree+0x21a/0x2b0 [ 224.010873] pcim_disable_device+0x20/0x30 [ 224.010875] devm_action_release+0x16/0x20 [ 224.010878] release_nodes+0x47/0xc0 [ 224.010880] devres_release_all+0x9f/0xe0 [ 224.010883] device_unbind_cleanup+0x12/0x80 [ 224.010885] device_release_driver_internal+0x1ca/0x210 [ 224.010887] driver_detach+0x4e/0xa0 [ 224.010889] bus_remove_driver+0x6f/0xf0 [ 224.010890] driver_unregister+0x35/0x60 [ 224.010892] pci_unregister_driver+0x44/0x90 [ 224.010894] proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci] ... [ 224.010921] ---[ end trace 0000000000000000 ]--- Remove the excess pci_disable_device() calls. [ rjw: Subject and changelog edits ]

AI-Powered Analysis

AILast updated: 06/28/2025, 17:10:35 UTC

Technical Analysis

CVE-2024-50093 addresses a vulnerability in the Linux kernel's processor thermal driver, specifically the intel int340x PCI device driver. The issue arises from improper handling of PCI device resource management during module unload. The processor_thermal driver uses the pcim_device_enable() function to enable the PCI device, which automatically disables the device upon driver detach. However, the driver erroneously calls pci_disable_device() again on an already disabled device. With recent improvements in PCI device resource management, such as the removal of legacy pcim_release() calls, this redundant call triggers kernel warnings and potentially unstable behavior. The warning logs indicate attempts to disable an already disabled device, leading to kernel warnings and call traces that could affect system stability. The root cause is the excess pci_disable_device() calls, which have been removed in the patch to resolve this issue. This vulnerability is primarily a stability and reliability concern rather than a direct security exploit, as it does not appear to allow privilege escalation, code execution, or data leakage. There are no known exploits in the wild, and the vulnerability does not require user interaction or authentication to manifest, but it is triggered during module unload operations related to the processor thermal driver. The affected versions are specific Linux kernel commits identified by their hashes, indicating this is a recent regression or bug introduced in certain kernel versions. No CVSS score is assigned yet, and the vulnerability is published and fixed in the Linux kernel source.

Potential Impact

For European organizations, the impact of CVE-2024-50093 is mainly related to system stability and reliability rather than direct security compromise. Systems running affected Linux kernel versions with the intel int340x processor thermal driver may experience kernel warnings and potential instability during module unload operations. This could lead to unexpected system behavior, crashes, or degraded performance in environments where thermal management is critical, such as data centers, cloud infrastructure, and industrial control systems. Organizations relying on Linux servers for critical workloads might face increased maintenance overhead and potential downtime if the issue is triggered frequently. However, since there is no indication of privilege escalation or remote code execution, the risk of data breach or system takeover is low. The vulnerability could indirectly affect availability if kernel stability issues cause reboots or service interruptions. European entities with large Linux deployments, particularly those using Intel processors with the affected driver, should prioritize patching to maintain operational stability.

Mitigation Recommendations

To mitigate CVE-2024-50093, European organizations should: 1) Identify Linux systems running affected kernel versions, especially those utilizing Intel processors with the int340x processor thermal driver. 2) Apply the latest Linux kernel updates or patches that remove the redundant pci_disable_device() calls as soon as they become available from trusted Linux distributions or kernel maintainers. 3) Monitor kernel logs for warnings related to pci_disable_device() to detect potential occurrences of this issue. 4) In environments where kernel updates are delayed, consider temporarily disabling or unloading the processor_thermal_pci driver if thermal management can be safely handled by alternative means, though this may impact thermal monitoring. 5) Test kernel updates in staging environments to ensure compatibility and stability before widespread deployment. 6) Maintain robust backup and recovery procedures to minimize downtime in case of kernel instability. These steps go beyond generic advice by focusing on driver-specific monitoring and controlled deployment of kernel patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.943Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfef3

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 5:10:35 PM

Last updated: 7/28/2025, 6:48:18 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats