CVE-2024-50279: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: dm cache: fix out-of-bounds access to the dirty bitset when resizing dm-cache checks the dirty bits of the cache blocks to be dropped when shrinking the fast device, but an index bug in bitset iteration causes out-of-bounds access. Reproduce steps: 1. create a cache device of 1024 cache blocks (128 bytes dirty bitset) dmsetup create cmeta --table "0 8192 linear /dev/sdc 0" dmsetup create cdata --table "0 131072 linear /dev/sdc 8192" dmsetup create corig --table "0 524288 linear /dev/sdc 262144" dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0" 2. shrink the fast device to 512 cache blocks, triggering out-of-bounds access to the dirty bitset (offset 0x80) dmsetup suspend cache dmsetup reload cdata --table "0 65536 linear /dev/sdc 8192" dmsetup resume cdata dmsetup resume cache KASAN reports: BUG: KASAN: vmalloc-out-of-bounds in cache_preresume+0x269/0x7b0 Read of size 8 at addr ffffc900000f3080 by task dmsetup/131 (...snip...) The buggy address belongs to the virtual mapping at [ffffc900000f3000, ffffc900000f5000) created by: cache_ctr+0x176a/0x35f0 (...snip...) Memory state around the buggy address: ffffc900000f2f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900000f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc900000f3080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffffc900000f3100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900000f3180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 Fix by making the index post-incremented.
AI Analysis
Technical Summary
CVE-2024-50279 is a vulnerability identified in the Linux kernel's device-mapper cache (dm-cache) subsystem. The flaw arises from an out-of-bounds memory access when resizing the dirty bitset during the shrinking of the fast device in a cache setup. Specifically, dm-cache maintains a bitset to track which cache blocks are 'dirty' (i.e., modified but not yet written back to the underlying storage). When the fast device is shrunk, dm-cache iterates over this dirty bitset to determine which blocks to drop. However, an indexing bug in the bitset iteration logic causes the code to access memory beyond the allocated bounds of the dirty bitset array. This can lead to a kernel memory read beyond the intended limits, as demonstrated by Kernel Address Sanitizer (KASAN) reports showing out-of-bounds reads at specific virtual addresses during cache device resizing operations. The vulnerability is triggered by a sequence of dmsetup commands that create cache devices with specific sizes and then shrink the fast device, causing the out-of-bounds access. The root cause is an incorrect post-increment of the index used to iterate over the dirty bitset, which was fixed by adjusting the index increment logic. While the vulnerability does not appear to have known exploits in the wild yet, it represents a flaw in kernel memory safety that could potentially be leveraged in more complex attack scenarios. The affected versions are specific Linux kernel commits identified by the hash f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498, indicating a narrow window of vulnerable kernel builds. No CVSS score has been assigned yet, and no direct evidence of remote exploitability or privilege escalation is provided in the disclosure.
Potential Impact
For European organizations, the impact of CVE-2024-50279 depends largely on their use of Linux systems employing dm-cache for storage acceleration or caching. This vulnerability could lead to kernel memory corruption or crashes (denial of service) when resizing cache devices, potentially disrupting critical services relying on affected storage configurations. Although no direct privilege escalation or remote code execution is documented, out-of-bounds memory access in the kernel can be a stepping stone for attackers to escalate privileges or cause system instability. Organizations running data centers, cloud infrastructure, or enterprise Linux servers with dm-cache enabled could face service interruptions or require emergency patching. Given the kernel-level nature of the flaw, it affects the integrity and availability of systems rather than confidentiality directly. The absence of known exploits reduces immediate risk, but the potential for future exploitation mandates proactive mitigation. European entities with compliance requirements around system stability and data integrity (e.g., financial institutions, healthcare providers) should prioritize addressing this vulnerability to avoid operational disruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patches that fix the dm-cache dirty bitset indexing bug as soon as they become available from trusted Linux distribution vendors or the kernel mainline. 2. If patching is delayed, avoid resizing dm-cache fast devices dynamically, especially shrinking operations, to prevent triggering the out-of-bounds access. 3. Audit and monitor systems using dm-cache for unusual kernel logs or crashes that might indicate attempts to exploit this vulnerability. 4. Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar memory safety issues proactively. 5. For critical production systems, consider disabling dm-cache if it is not essential or replacing it with alternative caching mechanisms until patches are applied. 6. Maintain up-to-date backups and recovery plans to mitigate potential service disruptions caused by kernel crashes. 7. Coordinate with Linux distribution security advisories to receive timely updates and verify that the applied kernel versions include the fix for CVE-2024-50279.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark
CVE-2024-50279: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: dm cache: fix out-of-bounds access to the dirty bitset when resizing dm-cache checks the dirty bits of the cache blocks to be dropped when shrinking the fast device, but an index bug in bitset iteration causes out-of-bounds access. Reproduce steps: 1. create a cache device of 1024 cache blocks (128 bytes dirty bitset) dmsetup create cmeta --table "0 8192 linear /dev/sdc 0" dmsetup create cdata --table "0 131072 linear /dev/sdc 8192" dmsetup create corig --table "0 524288 linear /dev/sdc 262144" dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0" 2. shrink the fast device to 512 cache blocks, triggering out-of-bounds access to the dirty bitset (offset 0x80) dmsetup suspend cache dmsetup reload cdata --table "0 65536 linear /dev/sdc 8192" dmsetup resume cdata dmsetup resume cache KASAN reports: BUG: KASAN: vmalloc-out-of-bounds in cache_preresume+0x269/0x7b0 Read of size 8 at addr ffffc900000f3080 by task dmsetup/131 (...snip...) The buggy address belongs to the virtual mapping at [ffffc900000f3000, ffffc900000f5000) created by: cache_ctr+0x176a/0x35f0 (...snip...) Memory state around the buggy address: ffffc900000f2f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900000f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc900000f3080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffffc900000f3100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900000f3180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 Fix by making the index post-incremented.
AI-Powered Analysis
Technical Analysis
CVE-2024-50279 is a vulnerability identified in the Linux kernel's device-mapper cache (dm-cache) subsystem. The flaw arises from an out-of-bounds memory access when resizing the dirty bitset during the shrinking of the fast device in a cache setup. Specifically, dm-cache maintains a bitset to track which cache blocks are 'dirty' (i.e., modified but not yet written back to the underlying storage). When the fast device is shrunk, dm-cache iterates over this dirty bitset to determine which blocks to drop. However, an indexing bug in the bitset iteration logic causes the code to access memory beyond the allocated bounds of the dirty bitset array. This can lead to a kernel memory read beyond the intended limits, as demonstrated by Kernel Address Sanitizer (KASAN) reports showing out-of-bounds reads at specific virtual addresses during cache device resizing operations. The vulnerability is triggered by a sequence of dmsetup commands that create cache devices with specific sizes and then shrink the fast device, causing the out-of-bounds access. The root cause is an incorrect post-increment of the index used to iterate over the dirty bitset, which was fixed by adjusting the index increment logic. While the vulnerability does not appear to have known exploits in the wild yet, it represents a flaw in kernel memory safety that could potentially be leveraged in more complex attack scenarios. The affected versions are specific Linux kernel commits identified by the hash f494a9c6b1b6dd9a9f21bbb75d9210d478eeb498, indicating a narrow window of vulnerable kernel builds. No CVSS score has been assigned yet, and no direct evidence of remote exploitability or privilege escalation is provided in the disclosure.
Potential Impact
For European organizations, the impact of CVE-2024-50279 depends largely on their use of Linux systems employing dm-cache for storage acceleration or caching. This vulnerability could lead to kernel memory corruption or crashes (denial of service) when resizing cache devices, potentially disrupting critical services relying on affected storage configurations. Although no direct privilege escalation or remote code execution is documented, out-of-bounds memory access in the kernel can be a stepping stone for attackers to escalate privileges or cause system instability. Organizations running data centers, cloud infrastructure, or enterprise Linux servers with dm-cache enabled could face service interruptions or require emergency patching. Given the kernel-level nature of the flaw, it affects the integrity and availability of systems rather than confidentiality directly. The absence of known exploits reduces immediate risk, but the potential for future exploitation mandates proactive mitigation. European entities with compliance requirements around system stability and data integrity (e.g., financial institutions, healthcare providers) should prioritize addressing this vulnerability to avoid operational disruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patches that fix the dm-cache dirty bitset indexing bug as soon as they become available from trusted Linux distribution vendors or the kernel mainline. 2. If patching is delayed, avoid resizing dm-cache fast devices dynamically, especially shrinking operations, to prevent triggering the out-of-bounds access. 3. Audit and monitor systems using dm-cache for unusual kernel logs or crashes that might indicate attempts to exploit this vulnerability. 4. Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar memory safety issues proactively. 5. For critical production systems, consider disabling dm-cache if it is not essential or replacing it with alternative caching mechanisms until patches are applied. 6. Maintain up-to-date backups and recovery plans to mitigate potential service disruptions caused by kernel crashes. 7. Coordinate with Linux distribution security advisories to receive timely updates and verify that the applied kernel versions include the fix for CVE-2024-50279.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.983Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdf720
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 1:42:57 PM
Last updated: 8/17/2025, 6:15:23 PM
Views: 21
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.