CVE-2024-50178: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: cpufreq: loongson3: Use raw_smp_processor_id() in do_service_request() Use raw_smp_processor_id() instead of plain smp_processor_id() in do_service_request(), otherwise we may get some errors with the driver enabled: BUG: using smp_processor_id() in preemptible [00000000] code: (udev-worker)/208 caller is loongson3_cpufreq_probe+0x5c/0x250 [loongson3_cpufreq]
AI Analysis
Technical Summary
CVE-2024-50178 is a vulnerability identified in the Linux kernel specifically related to the cpufreq driver for the Loongson3 processor architecture. The issue arises from the use of the function smp_processor_id() within the do_service_request() routine, which is executed in preemptible code context. Using smp_processor_id() in such a context is unsafe because it can lead to incorrect CPU identification due to preemption, potentially causing race conditions or logic errors. The correct function to use in this context is raw_smp_processor_id(), which returns the CPU ID without considering preemption and thus avoids these errors. The vulnerability manifests as kernel bugs or crashes, as indicated by the BUG message referencing smp_processor_id() usage in preemptible code, specifically triggered during the loongson3_cpufreq_probe operation. This flaw could lead to system instability or denial of service on affected systems running the vulnerable Linux kernel versions with the Loongson3 cpufreq driver enabled. The patch involves replacing smp_processor_id() with raw_smp_processor_id() in the affected code path to ensure safe CPU ID retrieval in preemptible contexts. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-50178 is primarily related to system stability and availability on Linux systems using the Loongson3 CPU architecture with the cpufreq driver enabled. While Loongson processors are less common globally compared to x86 or ARM architectures, they are used in some specialized or research environments. Organizations relying on these systems could experience kernel crashes or unexpected reboots, leading to potential downtime and disruption of services. This could affect critical infrastructure or research facilities using Loongson-based Linux servers. However, the vulnerability does not appear to allow privilege escalation, data leakage, or remote code execution, limiting its impact to availability and integrity of affected systems. Since no exploits are known in the wild, the immediate risk is low, but unpatched systems remain vulnerable to potential future exploitation or accidental crashes. European entities with niche deployments of Loongson3 Linux servers should prioritize patching to maintain operational stability.
Mitigation Recommendations
To mitigate CVE-2024-50178, organizations should: 1) Identify any Linux systems running on Loongson3 processors with the cpufreq driver enabled. 2) Apply the official Linux kernel patch that replaces smp_processor_id() with raw_smp_processor_id() in the do_service_request() function of the loongson3_cpufreq driver. 3) If immediate patching is not feasible, consider disabling the cpufreq driver for Loongson3 CPUs as a temporary workaround to prevent triggering the vulnerable code path. 4) Monitor system logs for kernel BUG messages related to smp_processor_id() usage in preemptible code to detect potential exploitation or instability. 5) Maintain up-to-date kernel versions and subscribe to Linux kernel security advisories for timely updates. 6) Conduct thorough testing of patches in staging environments before deployment to avoid unintended side effects.
Affected Countries
Germany, France, United Kingdom, Netherlands, Finland
CVE-2024-50178: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: cpufreq: loongson3: Use raw_smp_processor_id() in do_service_request() Use raw_smp_processor_id() instead of plain smp_processor_id() in do_service_request(), otherwise we may get some errors with the driver enabled: BUG: using smp_processor_id() in preemptible [00000000] code: (udev-worker)/208 caller is loongson3_cpufreq_probe+0x5c/0x250 [loongson3_cpufreq]
AI-Powered Analysis
Technical Analysis
CVE-2024-50178 is a vulnerability identified in the Linux kernel specifically related to the cpufreq driver for the Loongson3 processor architecture. The issue arises from the use of the function smp_processor_id() within the do_service_request() routine, which is executed in preemptible code context. Using smp_processor_id() in such a context is unsafe because it can lead to incorrect CPU identification due to preemption, potentially causing race conditions or logic errors. The correct function to use in this context is raw_smp_processor_id(), which returns the CPU ID without considering preemption and thus avoids these errors. The vulnerability manifests as kernel bugs or crashes, as indicated by the BUG message referencing smp_processor_id() usage in preemptible code, specifically triggered during the loongson3_cpufreq_probe operation. This flaw could lead to system instability or denial of service on affected systems running the vulnerable Linux kernel versions with the Loongson3 cpufreq driver enabled. The patch involves replacing smp_processor_id() with raw_smp_processor_id() in the affected code path to ensure safe CPU ID retrieval in preemptible contexts. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-50178 is primarily related to system stability and availability on Linux systems using the Loongson3 CPU architecture with the cpufreq driver enabled. While Loongson processors are less common globally compared to x86 or ARM architectures, they are used in some specialized or research environments. Organizations relying on these systems could experience kernel crashes or unexpected reboots, leading to potential downtime and disruption of services. This could affect critical infrastructure or research facilities using Loongson-based Linux servers. However, the vulnerability does not appear to allow privilege escalation, data leakage, or remote code execution, limiting its impact to availability and integrity of affected systems. Since no exploits are known in the wild, the immediate risk is low, but unpatched systems remain vulnerable to potential future exploitation or accidental crashes. European entities with niche deployments of Loongson3 Linux servers should prioritize patching to maintain operational stability.
Mitigation Recommendations
To mitigate CVE-2024-50178, organizations should: 1) Identify any Linux systems running on Loongson3 processors with the cpufreq driver enabled. 2) Apply the official Linux kernel patch that replaces smp_processor_id() with raw_smp_processor_id() in the do_service_request() function of the loongson3_cpufreq driver. 3) If immediate patching is not feasible, consider disabling the cpufreq driver for Loongson3 CPUs as a temporary workaround to prevent triggering the vulnerable code path. 4) Monitor system logs for kernel BUG messages related to smp_processor_id() usage in preemptible code to detect potential exploitation or instability. 5) Maintain up-to-date kernel versions and subscribe to Linux kernel security advisories for timely updates. 6) Conduct thorough testing of patches in staging environments before deployment to avoid unintended side effects.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.964Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9823c4522896dcbdf3dd
Added to database: 5/21/2025, 9:08:51 AM
Last enriched: 6/28/2025, 12:27:45 PM
Last updated: 8/12/2025, 10:40:16 AM
Views: 15
Related Threats
CVE-2025-8961: Memory Corruption in LibTIFF
MediumCVE-2025-8960: SQL Injection in Campcodes Online Flight Booking Management System
MediumCVE-2025-8958: Stack-based Buffer Overflow in Tenda TX3
HighCVE-2025-8957: SQL Injection in Campcodes Online Flight Booking Management System
MediumCVE-2025-54707: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in RealMag777 MDTF
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.