CVE-2024-50133: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Don't crash in stack_top() for tasks without vDSO Not all tasks have a vDSO mapped, for example kthreads never do. If such a task ever ends up calling stack_top(), it will derefence the NULL vdso pointer and crash. This can for example happen when using kunit: [<9000000000203874>] stack_top+0x58/0xa8 [<90000000002956cc>] arch_pick_mmap_layout+0x164/0x220 [<90000000003c284c>] kunit_vm_mmap_init+0x108/0x12c [<90000000003c1fbc>] __kunit_add_resource+0x38/0x8c [<90000000003c2704>] kunit_vm_mmap+0x88/0xc8 [<9000000000410b14>] usercopy_test_init+0xbc/0x25c [<90000000003c1db4>] kunit_try_run_case+0x5c/0x184 [<90000000003c3d54>] kunit_generic_run_threadfn_adapter+0x24/0x48 [<900000000022e4bc>] kthread+0xc8/0xd4 [<9000000000200ce8>] ret_from_kernel_thread+0xc/0xa4
AI Analysis
Technical Summary
CVE-2024-50133 is a vulnerability identified in the Linux kernel specifically affecting the LoongArch architecture. The issue arises because certain kernel tasks, such as kernel threads (kthreads), do not have a virtual dynamic shared object (vDSO) mapped into their address space. The vulnerability occurs when such a task calls the function stack_top(), which attempts to dereference the vDSO pointer without verifying its presence. Since the pointer is NULL for these tasks, this dereference leads to a kernel crash (null pointer dereference). This flaw can be triggered, for example, when using the kernel unit testing framework (kunit), as demonstrated by the provided stack trace. The crash occurs during memory mapping layout selection and resource addition within kunit, ultimately causing a kernel panic or system crash. The vulnerability affects specific Linux kernel versions identified by commit hashes, and no CVSS score has been assigned yet. There are no known exploits in the wild at the time of publication. The root cause is a missing null pointer check in stack_top() for tasks without vDSO, which is a design consideration since not all kernel threads have vDSO mappings. This vulnerability primarily impacts system stability and availability rather than confidentiality or integrity, as it leads to denial of service via kernel crashes.
Potential Impact
For European organizations, the primary impact of CVE-2024-50133 is on system availability and reliability. Systems running affected Linux kernel versions on LoongArch architecture could experience unexpected crashes, leading to service interruptions. This is particularly relevant for organizations using Linux in critical infrastructure, embedded systems, or specialized computing environments where LoongArch processors are deployed. Although LoongArch is less common in mainstream European IT environments compared to x86 or ARM, it is gaining traction in certain sectors such as research, telecommunications, and industrial control systems. A kernel crash can cause downtime, disrupt business operations, and potentially lead to data loss if systems are not properly backed up or if the crash occurs during critical operations. Since the vulnerability can be triggered by kernel unit testing or other kernel-level operations, it may also affect development and testing environments, delaying software delivery and increasing operational risk. However, there is no indication that this vulnerability can be exploited for privilege escalation or data breach, limiting its impact to denial of service.
Mitigation Recommendations
To mitigate CVE-2024-50133, European organizations should: 1) Apply the official Linux kernel patches that address the null pointer dereference in stack_top() for tasks without vDSO as soon as they become available. 2) Avoid running kernel unit testing (kunit) or other kernel-level testing frameworks on production systems, especially on affected LoongArch kernel versions. 3) Implement robust monitoring and alerting for kernel crashes and system panics to enable rapid detection and response. 4) Where possible, isolate systems running LoongArch kernels in controlled environments to limit impact and facilitate quick recovery. 5) Maintain up-to-date backups and disaster recovery plans to minimize downtime and data loss in case of crashes. 6) Engage with Linux distribution vendors and hardware providers to ensure timely updates and support for LoongArch platforms. 7) Conduct thorough testing of kernel updates in staging environments before deployment to production to avoid regressions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2024-50133: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Don't crash in stack_top() for tasks without vDSO Not all tasks have a vDSO mapped, for example kthreads never do. If such a task ever ends up calling stack_top(), it will derefence the NULL vdso pointer and crash. This can for example happen when using kunit: [<9000000000203874>] stack_top+0x58/0xa8 [<90000000002956cc>] arch_pick_mmap_layout+0x164/0x220 [<90000000003c284c>] kunit_vm_mmap_init+0x108/0x12c [<90000000003c1fbc>] __kunit_add_resource+0x38/0x8c [<90000000003c2704>] kunit_vm_mmap+0x88/0xc8 [<9000000000410b14>] usercopy_test_init+0xbc/0x25c [<90000000003c1db4>] kunit_try_run_case+0x5c/0x184 [<90000000003c3d54>] kunit_generic_run_threadfn_adapter+0x24/0x48 [<900000000022e4bc>] kthread+0xc8/0xd4 [<9000000000200ce8>] ret_from_kernel_thread+0xc/0xa4
AI-Powered Analysis
Technical Analysis
CVE-2024-50133 is a vulnerability identified in the Linux kernel specifically affecting the LoongArch architecture. The issue arises because certain kernel tasks, such as kernel threads (kthreads), do not have a virtual dynamic shared object (vDSO) mapped into their address space. The vulnerability occurs when such a task calls the function stack_top(), which attempts to dereference the vDSO pointer without verifying its presence. Since the pointer is NULL for these tasks, this dereference leads to a kernel crash (null pointer dereference). This flaw can be triggered, for example, when using the kernel unit testing framework (kunit), as demonstrated by the provided stack trace. The crash occurs during memory mapping layout selection and resource addition within kunit, ultimately causing a kernel panic or system crash. The vulnerability affects specific Linux kernel versions identified by commit hashes, and no CVSS score has been assigned yet. There are no known exploits in the wild at the time of publication. The root cause is a missing null pointer check in stack_top() for tasks without vDSO, which is a design consideration since not all kernel threads have vDSO mappings. This vulnerability primarily impacts system stability and availability rather than confidentiality or integrity, as it leads to denial of service via kernel crashes.
Potential Impact
For European organizations, the primary impact of CVE-2024-50133 is on system availability and reliability. Systems running affected Linux kernel versions on LoongArch architecture could experience unexpected crashes, leading to service interruptions. This is particularly relevant for organizations using Linux in critical infrastructure, embedded systems, or specialized computing environments where LoongArch processors are deployed. Although LoongArch is less common in mainstream European IT environments compared to x86 or ARM, it is gaining traction in certain sectors such as research, telecommunications, and industrial control systems. A kernel crash can cause downtime, disrupt business operations, and potentially lead to data loss if systems are not properly backed up or if the crash occurs during critical operations. Since the vulnerability can be triggered by kernel unit testing or other kernel-level operations, it may also affect development and testing environments, delaying software delivery and increasing operational risk. However, there is no indication that this vulnerability can be exploited for privilege escalation or data breach, limiting its impact to denial of service.
Mitigation Recommendations
To mitigate CVE-2024-50133, European organizations should: 1) Apply the official Linux kernel patches that address the null pointer dereference in stack_top() for tasks without vDSO as soon as they become available. 2) Avoid running kernel unit testing (kunit) or other kernel-level testing frameworks on production systems, especially on affected LoongArch kernel versions. 3) Implement robust monitoring and alerting for kernel crashes and system panics to enable rapid detection and response. 4) Where possible, isolate systems running LoongArch kernels in controlled environments to limit impact and facilitate quick recovery. 5) Maintain up-to-date backups and disaster recovery plans to minimize downtime and data loss in case of crashes. 6) Engage with Linux distribution vendors and hardware providers to ensure timely updates and support for LoongArch platforms. 7) Conduct thorough testing of kernel updates in staging environments before deployment to production to avoid regressions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.955Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe0059
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 5:39:39 PM
Last updated: 7/30/2025, 4:13:45 AM
Views: 10
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.