CVE-2024-50249: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Make rmw_lock a raw_spin_lock The following BUG was triggered: ============================= [ BUG: Invalid wait context ] 6.12.0-rc2-XXX #406 Not tainted ----------------------------- kworker/1:1/62 is trying to lock: ffffff8801593030 (&cpc_ptr->rmw_lock){+.+.}-{3:3}, at: cpc_write+0xcc/0x370 other info that might help us debug this: context-{5:5} 2 locks held by kworker/1:1/62: #0: ffffff897ef5ec98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2c/0x50 #1: ffffff880154e238 (&sg_policy->update_lock){....}-{2:2}, at: sugov_update_shared+0x3c/0x280 stack backtrace: CPU: 1 UID: 0 PID: 62 Comm: kworker/1:1 Not tainted 6.12.0-rc2-g9654bd3e8806 #406 Workqueue: 0x0 (events) Call trace: dump_backtrace+0xa4/0x130 show_stack+0x20/0x38 dump_stack_lvl+0x90/0xd0 dump_stack+0x18/0x28 __lock_acquire+0x480/0x1ad8 lock_acquire+0x114/0x310 _raw_spin_lock+0x50/0x70 cpc_write+0xcc/0x370 cppc_set_perf+0xa0/0x3a8 cppc_cpufreq_fast_switch+0x40/0xc0 cpufreq_driver_fast_switch+0x4c/0x218 sugov_update_shared+0x234/0x280 update_load_avg+0x6ec/0x7b8 dequeue_entities+0x108/0x830 dequeue_task_fair+0x58/0x408 __schedule+0x4f0/0x1070 schedule+0x54/0x130 worker_thread+0xc0/0x2e8 kthread+0x130/0x148 ret_from_fork+0x10/0x20 sugov_update_shared() locks a raw_spinlock while cpc_write() locks a spinlock. To have a correct wait-type order, update rmw_lock to a raw spinlock and ensure that interrupts will be disabled on the CPU holding it. [ rjw: Changelog edits ]
AI Analysis
Technical Summary
CVE-2024-50249 is a vulnerability identified in the Linux kernel related to the Advanced Configuration and Power Interface (ACPI) CPPC (Collaborative Processor Performance Control) subsystem. The issue arises from improper locking mechanisms within the kernel code, specifically involving the rmw_lock, which was originally not a raw_spin_lock. The vulnerability manifests as a BUG triggered by an invalid wait context during concurrent operations on kernel worker threads. The root cause is a locking order and type mismatch: the function sugov_update_shared() locks a raw_spinlock, while cpc_write() locks a spinlock, leading to potential deadlocks or kernel panics. The fix involves converting rmw_lock to a raw_spin_lock and ensuring that interrupts are disabled on the CPU holding this lock to maintain correct wait-type order and prevent invalid wait contexts. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes and is present in kernel version 6.12.0-rc2 and related builds. Although no known exploits are currently reported in the wild, the issue can cause system instability or crashes due to kernel BUGs triggered by improper locking in power management code paths. The vulnerability is technical and low-level, impacting kernel synchronization primitives critical for CPU frequency scaling and power management.
Potential Impact
For European organizations relying on Linux-based infrastructure, this vulnerability could lead to unexpected system crashes or kernel panics, particularly on servers or embedded systems utilizing affected kernel versions. Such instability can disrupt critical services, degrade availability, and increase operational costs due to downtime and troubleshooting efforts. Organizations running high-performance computing, cloud services, or telecommunications infrastructure on Linux kernels in the affected versions may experience reliability issues. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can be significant, especially in environments requiring high uptime. Additionally, the complexity of the vulnerability means that exploitation requires triggering specific kernel code paths, which may limit widespread exploitation but does not eliminate risk. European entities with large-scale Linux deployments, including public sector, financial institutions, and industrial control systems, should be aware of potential disruptions. The lack of known exploits reduces immediate threat but patching remains critical to maintain system stability and prevent future exploitation attempts.
Mitigation Recommendations
1. Immediate application of the official Linux kernel patches that convert rmw_lock to a raw_spin_lock and disable interrupts on the CPU holding the lock. Monitor Linux kernel mailing lists and vendor advisories for updated stable kernel releases containing this fix. 2. For organizations unable to upgrade immediately, consider temporarily disabling or limiting workloads that heavily utilize CPU frequency scaling or power management features tied to CPPC to reduce exposure. 3. Implement rigorous kernel crash monitoring and alerting to detect early signs of this bug manifesting in production systems. 4. Conduct thorough regression testing in staging environments after patching to ensure no adverse effects on system performance or stability. 5. Maintain up-to-date kernel versions and subscribe to security advisories from Linux distributions commonly used in Europe (e.g., Debian, Ubuntu, Red Hat, SUSE) to receive timely updates. 6. For embedded or specialized Linux systems, coordinate with hardware vendors to obtain patched kernel versions or firmware updates addressing this issue. 7. Document and review kernel configuration options related to ACPI and CPPC to understand exposure scope and adjust configurations if feasible to mitigate risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-50249: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Make rmw_lock a raw_spin_lock The following BUG was triggered: ============================= [ BUG: Invalid wait context ] 6.12.0-rc2-XXX #406 Not tainted ----------------------------- kworker/1:1/62 is trying to lock: ffffff8801593030 (&cpc_ptr->rmw_lock){+.+.}-{3:3}, at: cpc_write+0xcc/0x370 other info that might help us debug this: context-{5:5} 2 locks held by kworker/1:1/62: #0: ffffff897ef5ec98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2c/0x50 #1: ffffff880154e238 (&sg_policy->update_lock){....}-{2:2}, at: sugov_update_shared+0x3c/0x280 stack backtrace: CPU: 1 UID: 0 PID: 62 Comm: kworker/1:1 Not tainted 6.12.0-rc2-g9654bd3e8806 #406 Workqueue: 0x0 (events) Call trace: dump_backtrace+0xa4/0x130 show_stack+0x20/0x38 dump_stack_lvl+0x90/0xd0 dump_stack+0x18/0x28 __lock_acquire+0x480/0x1ad8 lock_acquire+0x114/0x310 _raw_spin_lock+0x50/0x70 cpc_write+0xcc/0x370 cppc_set_perf+0xa0/0x3a8 cppc_cpufreq_fast_switch+0x40/0xc0 cpufreq_driver_fast_switch+0x4c/0x218 sugov_update_shared+0x234/0x280 update_load_avg+0x6ec/0x7b8 dequeue_entities+0x108/0x830 dequeue_task_fair+0x58/0x408 __schedule+0x4f0/0x1070 schedule+0x54/0x130 worker_thread+0xc0/0x2e8 kthread+0x130/0x148 ret_from_fork+0x10/0x20 sugov_update_shared() locks a raw_spinlock while cpc_write() locks a spinlock. To have a correct wait-type order, update rmw_lock to a raw spinlock and ensure that interrupts will be disabled on the CPU holding it. [ rjw: Changelog edits ]
AI-Powered Analysis
Technical Analysis
CVE-2024-50249 is a vulnerability identified in the Linux kernel related to the Advanced Configuration and Power Interface (ACPI) CPPC (Collaborative Processor Performance Control) subsystem. The issue arises from improper locking mechanisms within the kernel code, specifically involving the rmw_lock, which was originally not a raw_spin_lock. The vulnerability manifests as a BUG triggered by an invalid wait context during concurrent operations on kernel worker threads. The root cause is a locking order and type mismatch: the function sugov_update_shared() locks a raw_spinlock, while cpc_write() locks a spinlock, leading to potential deadlocks or kernel panics. The fix involves converting rmw_lock to a raw_spin_lock and ensuring that interrupts are disabled on the CPU holding this lock to maintain correct wait-type order and prevent invalid wait contexts. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes and is present in kernel version 6.12.0-rc2 and related builds. Although no known exploits are currently reported in the wild, the issue can cause system instability or crashes due to kernel BUGs triggered by improper locking in power management code paths. The vulnerability is technical and low-level, impacting kernel synchronization primitives critical for CPU frequency scaling and power management.
Potential Impact
For European organizations relying on Linux-based infrastructure, this vulnerability could lead to unexpected system crashes or kernel panics, particularly on servers or embedded systems utilizing affected kernel versions. Such instability can disrupt critical services, degrade availability, and increase operational costs due to downtime and troubleshooting efforts. Organizations running high-performance computing, cloud services, or telecommunications infrastructure on Linux kernels in the affected versions may experience reliability issues. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can be significant, especially in environments requiring high uptime. Additionally, the complexity of the vulnerability means that exploitation requires triggering specific kernel code paths, which may limit widespread exploitation but does not eliminate risk. European entities with large-scale Linux deployments, including public sector, financial institutions, and industrial control systems, should be aware of potential disruptions. The lack of known exploits reduces immediate threat but patching remains critical to maintain system stability and prevent future exploitation attempts.
Mitigation Recommendations
1. Immediate application of the official Linux kernel patches that convert rmw_lock to a raw_spin_lock and disable interrupts on the CPU holding the lock. Monitor Linux kernel mailing lists and vendor advisories for updated stable kernel releases containing this fix. 2. For organizations unable to upgrade immediately, consider temporarily disabling or limiting workloads that heavily utilize CPU frequency scaling or power management features tied to CPPC to reduce exposure. 3. Implement rigorous kernel crash monitoring and alerting to detect early signs of this bug manifesting in production systems. 4. Conduct thorough regression testing in staging environments after patching to ensure no adverse effects on system performance or stability. 5. Maintain up-to-date kernel versions and subscribe to security advisories from Linux distributions commonly used in Europe (e.g., Debian, Ubuntu, Red Hat, SUSE) to receive timely updates. 6. For embedded or specialized Linux systems, coordinate with hardware vendors to obtain patched kernel versions or firmware updates addressing this issue. 7. Document and review kernel configuration options related to ACPI and CPPC to understand exposure scope and adjust configurations if feasible to mitigate risk.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.979Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdcf9e
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/27/2025, 10:10:17 PM
Last updated: 8/14/2025, 6:40:29 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.