Skip to main content

CVE-2024-50139: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50139cvecve-2024-50139
Published: Thu Nov 07 2024 (11/07/2024, 09:31:15 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix shift-out-of-bounds bug Fix a shift-out-of-bounds bug reported by UBSAN when running VM with MTE enabled host kernel. UBSAN: shift-out-of-bounds in arch/arm64/kvm/sys_regs.c:1988:14 shift exponent 33 is too large for 32-bit type 'int' CPU: 26 UID: 0 PID: 7629 Comm: qemu-kvm Not tainted 6.12.0-rc2 #34 Hardware name: IEI NF5280R7/Mitchell MB, BIOS 00.00. 2024-10-12 09:28:54 10/14/2024 Call trace: dump_backtrace+0xa0/0x128 show_stack+0x20/0x38 dump_stack_lvl+0x74/0x90 dump_stack+0x18/0x28 __ubsan_handle_shift_out_of_bounds+0xf8/0x1e0 reset_clidr+0x10c/0x1c8 kvm_reset_sys_regs+0x50/0x1c8 kvm_reset_vcpu+0xec/0x2b0 __kvm_vcpu_set_target+0x84/0x158 kvm_vcpu_set_target+0x138/0x168 kvm_arch_vcpu_ioctl_vcpu_init+0x40/0x2b0 kvm_arch_vcpu_ioctl+0x28c/0x4b8 kvm_vcpu_ioctl+0x4bc/0x7a8 __arm64_sys_ioctl+0xb4/0x100 invoke_syscall+0x70/0x100 el0_svc_common.constprop.0+0x48/0xf0 do_el0_svc+0x24/0x38 el0_svc+0x3c/0x158 el0t_64_sync_handler+0x120/0x130 el0t_64_sync+0x194/0x198

AI-Powered Analysis

AILast updated: 06/28/2025, 17:40:46 UTC

Technical Analysis

CVE-2024-50139 is a vulnerability identified in the Linux kernel specifically affecting the Kernel-based Virtual Machine (KVM) implementation on the ARM64 architecture. The issue is a shift-out-of-bounds bug detected by the Undefined Behavior Sanitizer (UBSAN) when running virtual machines (VMs) on a host kernel with Memory Tagging Extension (MTE) enabled. The vulnerability arises from an improper shift operation in the source file arch/arm64/kvm/sys_regs.c at line 1988, where a shift exponent of 33 is applied to a 32-bit integer type, which is invalid and leads to undefined behavior. This bug manifests during the reset of system registers for a virtual CPU (vCPU) within KVM, as indicated by the call trace involving functions such as kvm_reset_sys_regs and kvm_reset_vcpu. The flaw could potentially cause kernel crashes or unpredictable behavior in the KVM subsystem on ARM64 hosts, particularly when MTE is enabled. Although no known exploits are reported in the wild, the vulnerability affects the stability and reliability of virtualization environments on ARM64 Linux systems, which are increasingly used in cloud and edge computing scenarios. The issue has been addressed in Linux kernel version 6.12.0-rc2 and later, but the patch links are not provided in the source information. This vulnerability does not have an assigned CVSS score yet, and it requires privileged access (root) to trigger, as it involves KVM and qemu-kvm processes. No user interaction is needed once the attacker has sufficient privileges to run or manage VMs on the affected host.

Potential Impact

For European organizations, the impact of CVE-2024-50139 primarily concerns entities relying on ARM64-based Linux virtualization infrastructures, such as cloud service providers, telecom operators deploying edge computing, and enterprises using ARM64 servers for virtualization. The vulnerability could lead to denial of service (DoS) conditions by causing kernel panics or crashes in KVM virtual machines, disrupting critical services and workloads. In environments where ARM64 virtualization is used for multi-tenant cloud hosting, this could affect service availability and reliability, potentially leading to operational downtime and financial losses. Although there is no evidence of privilege escalation or remote code execution, the instability introduced by this bug could be exploited by malicious insiders or attackers with administrative access to degrade system performance or availability. Given the growing adoption of ARM64 architectures in Europe, especially in sectors like telecommunications (5G infrastructure), automotive, and cloud computing, the vulnerability poses a tangible risk to the continuity of services relying on these platforms.

Mitigation Recommendations

To mitigate CVE-2024-50139, European organizations should: 1) Apply the latest Linux kernel updates that include the fix for this vulnerability, specifically versions 6.12.0-rc2 or later, as soon as they become available and tested in their environments. 2) For environments using KVM on ARM64 hosts with MTE enabled, temporarily consider disabling MTE if kernel updates cannot be immediately applied, as MTE triggers the bug. 3) Restrict administrative access to KVM and virtualization management interfaces to trusted personnel only, minimizing the risk of exploitation by insiders. 4) Implement robust monitoring of kernel logs and virtualization subsystem behavior to detect anomalies or crashes related to this issue. 5) In cloud or multi-tenant environments, isolate ARM64 virtualization hosts and apply strict access controls to prevent unauthorized VM creation or manipulation. 6) Coordinate with hardware and software vendors to ensure compatibility and timely patch deployment, especially for ARM64 server platforms widely used in European data centers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.956Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0077

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 5:40:46 PM

Last updated: 7/31/2025, 8:46:58 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats