Skip to main content

CVE-2024-50143: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50143cvecve-2024-50143
Published: Thu Nov 07 2024 (11/07/2024, 09:31:20 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: udf: fix uninit-value use in udf_get_fileshortad Check for overflow when computing alen in udf_current_aext to mitigate later uninit-value use in udf_get_fileshortad KMSAN bug[1]. After applying the patch reproducer did not trigger any issue[2]. [1] https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df [2] https://syzkaller.appspot.com/x/log.txt?x=10242227980000

AI-Powered Analysis

AILast updated: 06/28/2025, 17:42:00 UTC

Technical Analysis

CVE-2024-50143 is a vulnerability identified in the Linux kernel specifically related to the Universal Disk Format (UDF) filesystem implementation. The issue arises from the use of uninitialized values in the function udf_get_fileshortad, which is responsible for handling certain UDF file attributes. The root cause involves improper handling of the allocation length (alen) calculation in udf_current_aext, where an overflow check was missing. This flaw could lead to the use of uninitialized memory values, potentially causing undefined behavior such as memory corruption or information leakage. The vulnerability was discovered through kernel memory sanitizer (KMSAN) testing, which flagged the uninitialized value usage. A patch has been applied to add overflow checks and prevent uninitialized value usage, and subsequent testing with a reproducer did not trigger any issues, indicating the patch's effectiveness. No known exploits are currently reported in the wild, and the vulnerability affects multiple versions of the Linux kernel identified by specific commit hashes. The vulnerability does not have an assigned CVSS score yet, and it does not require user interaction or authentication to be triggered, as it is related to kernel-level filesystem code.

Potential Impact

For European organizations, the impact of CVE-2024-50143 could be significant depending on their use of Linux systems that mount or interact with UDF filesystems. UDF is commonly used for optical media such as DVDs and Blu-ray discs, and in some cases for removable storage or virtual disk images. Exploitation of this vulnerability could lead to kernel memory corruption, potentially resulting in system crashes (denial of service), privilege escalation, or information disclosure. This could disrupt critical services, especially in sectors relying heavily on Linux infrastructure such as telecommunications, finance, government, and manufacturing. Additionally, organizations using Linux-based embedded systems or appliances that handle UDF filesystems might be at risk. Although no active exploits are known, the vulnerability's presence in the kernel means that attackers with local access or the ability to supply crafted UDF media could attempt exploitation. The risk is heightened in environments where untrusted media is used or where attackers have some level of system access.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that address this vulnerability as soon as they become available for their specific kernel versions. System administrators should audit their environments to identify systems that mount or process UDF filesystems and restrict the use of untrusted UDF media where possible. Implementing strict access controls and monitoring for unusual kernel or filesystem activity can help detect exploitation attempts. For environments where patching is delayed, consider disabling UDF filesystem support if it is not required. Additionally, organizations should ensure that kernel memory sanitizer (KMSAN) or similar runtime analysis tools are used in development and testing environments to detect similar issues proactively. Regularly updating Linux distributions and applying security advisories promptly will reduce exposure. Finally, educating users about the risks of using untrusted removable media can help mitigate social engineering vectors that might lead to exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.956Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe00b4

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 5:42:00 PM

Last updated: 8/12/2025, 7:35:48 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats