Skip to main content

CVE-2024-50127: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50127cvecve-2024-50127
Published: Tue Nov 05 2024 (11/05/2024, 17:10:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin' pointer may become dangling due to sched switch / removal caused by 'advance_sched()', and critical section protected by 'q->current_entry_lock' is too small to prevent from such a scenario (which causes use-after-free detected by KASAN). Fix this by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update 'admin' immediately before an attempt to schedule freeing.

AI-Powered Analysis

AILast updated: 07/02/2025, 23:57:38 UTC

Technical Analysis

CVE-2024-50127 is a high-severity use-after-free vulnerability in the Linux kernel's network scheduling subsystem, specifically within the taprio_change() function. The vulnerability arises because the 'admin' pointer can become dangling due to a sched switch or removal triggered by the advance_sched() function. The critical section protected by the 'q->current_entry_lock' is insufficiently sized to prevent this race condition, leading to a use-after-free scenario detected by Kernel Address Sanitizer (KASAN). The root cause is that the pointer update mechanism uses rcu_assign_pointer(), which does not immediately replace the pointer, allowing a window where the pointer becomes invalid. The fix involves switching to rcu_replace_pointer(), which updates the 'admin' pointer immediately before scheduling the freeing operation, thereby preventing the dangling pointer from being dereferenced. This vulnerability is classified under CWE-416 (Use After Free) and has a CVSS 3.1 base score of 7.8, indicating high severity. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning exploitation could lead to complete system compromise. No known exploits are currently reported in the wild. The affected versions correspond to specific Linux kernel commits identified by the hash a3d43c0d56f1b94e74963a2fbadfb70126d92213. The vulnerability was published on November 5, 2024, and has been addressed in recent kernel updates.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on Linux-based infrastructure for critical network functions, such as telecommunications, cloud services, and data centers. Exploitation could allow a local attacker with limited privileges to execute arbitrary code in kernel space, potentially leading to privilege escalation, data breaches, or denial of service. Given the high impact on confidentiality, integrity, and availability, attackers could disrupt essential services or gain persistent access to sensitive systems. Organizations running Linux kernels with the affected versions in production environments, particularly those managing network traffic scheduling, are at risk. The vulnerability's local attack vector means that insider threats or compromised user accounts could be leveraged to exploit this flaw. Additionally, the lack of user interaction requirement increases the risk of automated or scripted attacks once local access is obtained. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept or weaponized exploits could emerge rapidly after disclosure.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched versions that incorporate the fix using rcu_replace_pointer(). Kernel updates should be tested and deployed promptly in all environments, especially those handling critical network scheduling tasks. System administrators should audit systems to identify any running vulnerable kernel versions and restrict local access to trusted users only. Employing kernel hardening techniques such as Kernel Address Sanitizer (KASAN) in testing environments can help detect similar issues proactively. Additionally, implementing strict access controls and monitoring for unusual local activity can mitigate exploitation risks. Organizations should also ensure that their incident response teams are prepared to detect and respond to potential exploitation attempts targeting this vulnerability. Where immediate patching is not feasible, consider isolating vulnerable systems or limiting the use of affected network scheduling features until updates can be applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.954Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe000a

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 7/2/2025, 11:57:38 PM

Last updated: 8/6/2025, 6:44:17 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats