Skip to main content

CVE-2024-50133: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50133cvecve-2024-50133
Published: Tue Nov 05 2024 (11/05/2024, 17:10:58 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: LoongArch: Don't crash in stack_top() for tasks without vDSO Not all tasks have a vDSO mapped, for example kthreads never do. If such a task ever ends up calling stack_top(), it will derefence the NULL vdso pointer and crash. This can for example happen when using kunit: [<9000000000203874>] stack_top+0x58/0xa8 [<90000000002956cc>] arch_pick_mmap_layout+0x164/0x220 [<90000000003c284c>] kunit_vm_mmap_init+0x108/0x12c [<90000000003c1fbc>] __kunit_add_resource+0x38/0x8c [<90000000003c2704>] kunit_vm_mmap+0x88/0xc8 [<9000000000410b14>] usercopy_test_init+0xbc/0x25c [<90000000003c1db4>] kunit_try_run_case+0x5c/0x184 [<90000000003c3d54>] kunit_generic_run_threadfn_adapter+0x24/0x48 [<900000000022e4bc>] kthread+0xc8/0xd4 [<9000000000200ce8>] ret_from_kernel_thread+0xc/0xa4

AI-Powered Analysis

AILast updated: 06/28/2025, 17:39:39 UTC

Technical Analysis

CVE-2024-50133 is a vulnerability identified in the Linux kernel specifically affecting the LoongArch architecture. The issue arises because certain kernel tasks, such as kernel threads (kthreads), do not have a virtual dynamic shared object (vDSO) mapped into their address space. The vulnerability occurs when such a task calls the function stack_top(), which attempts to dereference the vDSO pointer without verifying its presence. Since the pointer is NULL for these tasks, this dereference leads to a kernel crash (null pointer dereference). This flaw can be triggered, for example, when using the kernel unit testing framework (kunit), as demonstrated by the provided stack trace. The crash occurs during memory mapping layout selection and resource addition within kunit, ultimately causing a kernel panic or system crash. The vulnerability affects specific Linux kernel versions identified by commit hashes, and no CVSS score has been assigned yet. There are no known exploits in the wild at the time of publication. The root cause is a missing null pointer check in stack_top() for tasks without vDSO, which is a design consideration since not all kernel threads have vDSO mappings. This vulnerability primarily impacts system stability and availability rather than confidentiality or integrity, as it leads to denial of service via kernel crashes.

Potential Impact

For European organizations, the primary impact of CVE-2024-50133 is on system availability and reliability. Systems running affected Linux kernel versions on LoongArch architecture could experience unexpected crashes, leading to service interruptions. This is particularly relevant for organizations using Linux in critical infrastructure, embedded systems, or specialized computing environments where LoongArch processors are deployed. Although LoongArch is less common in mainstream European IT environments compared to x86 or ARM, it is gaining traction in certain sectors such as research, telecommunications, and industrial control systems. A kernel crash can cause downtime, disrupt business operations, and potentially lead to data loss if systems are not properly backed up or if the crash occurs during critical operations. Since the vulnerability can be triggered by kernel unit testing or other kernel-level operations, it may also affect development and testing environments, delaying software delivery and increasing operational risk. However, there is no indication that this vulnerability can be exploited for privilege escalation or data breach, limiting its impact to denial of service.

Mitigation Recommendations

To mitigate CVE-2024-50133, European organizations should: 1) Apply the official Linux kernel patches that address the null pointer dereference in stack_top() for tasks without vDSO as soon as they become available. 2) Avoid running kernel unit testing (kunit) or other kernel-level testing frameworks on production systems, especially on affected LoongArch kernel versions. 3) Implement robust monitoring and alerting for kernel crashes and system panics to enable rapid detection and response. 4) Where possible, isolate systems running LoongArch kernels in controlled environments to limit impact and facilitate quick recovery. 5) Maintain up-to-date backups and disaster recovery plans to minimize downtime and data loss in case of crashes. 6) Engage with Linux distribution vendors and hardware providers to ensure timely updates and support for LoongArch platforms. 7) Conduct thorough testing of kernel updates in staging environments before deployment to production to avoid regressions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.955Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0059

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 5:39:39 PM

Last updated: 7/30/2025, 4:13:45 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats