Skip to main content

CVE-2024-50280: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50280cvecve-2024-50280
Published: Tue Nov 19 2024 (11/19/2024, 01:30:21 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: dm cache: fix flushing uninitialized delayed_work on cache_ctr error An unexpected WARN_ON from flush_work() may occur when cache creation fails, caused by destroying the uninitialized delayed_work waker in the error path of cache_create(). For example, the warning appears on the superblock checksum error. Reproduce steps: dmsetup create cmeta --table "0 8192 linear /dev/sdc 0" dmsetup create cdata --table "0 65536 linear /dev/sdc 8192" dmsetup create corig --table "0 524288 linear /dev/sdc 262144" dd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0" Kernel logs: (snip) WARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890 Fix by pulling out the cancel_delayed_work_sync() from the constructor's error path. This patch doesn't affect the use-after-free fix for concurrent dm_resume and dm_destroy (commit 6a459d8edbdb ("dm cache: Fix UAF in destroy()")) as cache_dtr is not changed.

AI-Powered Analysis

AILast updated: 07/03/2025, 14:13:09 UTC

Technical Analysis

CVE-2024-50280 is a high-severity vulnerability in the Linux kernel's device mapper (dm) cache subsystem. The flaw arises from improper handling of delayed work structures during error paths in cache creation. Specifically, when cache creation fails (for example, due to a superblock checksum error), the kernel attempts to flush uninitialized delayed_work structures, triggering unexpected WARN_ON warnings and potentially leading to use-after-free conditions. The vulnerability stems from the destruction of uninitialized delayed_work wakers in the error path of cache_create(), which can cause kernel instability or crashes. The issue was fixed by removing the cancel_delayed_work_sync() call from the constructor's error path, ensuring that uninitialized delayed_work is not improperly flushed or canceled. This fix does not affect prior fixes addressing use-after-free during concurrent dm_resume and dm_destroy operations. The vulnerability affects multiple Linux kernel versions identified by specific commit hashes, indicating a range of affected kernel builds. Exploitation requires local access with low privileges (PR:L) and no user interaction (UI:N), but the attack vector is local (AV:L). The impact is high across confidentiality, integrity, and availability, as the flaw can lead to kernel crashes or potentially privilege escalation through kernel memory corruption (CWE-416: Use After Free). No known exploits are currently reported in the wild. The vulnerability was published on November 19, 2024, and has a CVSS v3.1 score of 7.8, reflecting its high severity and potential impact on affected systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk to systems running vulnerable Linux kernel versions, particularly those utilizing device mapper cache features for storage performance optimization. The potential for kernel crashes or memory corruption can lead to denial of service, data corruption, or privilege escalation, impacting critical infrastructure, enterprise servers, and cloud environments. Organizations relying on Linux-based servers for sensitive data processing or critical services may face confidentiality breaches or operational disruptions. Given the local attack vector, insider threats or compromised user accounts could exploit this flaw to escalate privileges or destabilize systems. The absence of known exploits reduces immediate risk, but the high severity and kernel-level impact necessitate prompt remediation to avoid exploitation as proof-of-concept or weaponized exploits emerge. The vulnerability could affect sectors such as finance, healthcare, telecommunications, and government services across Europe, where Linux servers are prevalent.

Mitigation Recommendations

European organizations should prioritize updating Linux kernels to versions that include the patch for CVE-2024-50280. Since the vulnerability involves kernel-level delayed_work handling, applying official kernel updates or backported patches from trusted Linux distributions is critical. System administrators should audit systems for usage of device mapper cache features and assess whether affected kernel versions are in use. Where immediate patching is not feasible, organizations can limit local user privileges and restrict access to systems running vulnerable kernels to trusted personnel only. Monitoring kernel logs for WARN_ON messages related to flush_work() may help detect attempts to trigger the flaw. Additionally, implementing strict access controls, employing kernel hardening techniques (e.g., SELinux, AppArmor), and using intrusion detection systems to monitor for anomalous kernel behavior can reduce exploitation risk. Coordination with Linux distribution vendors for timely patch deployment and testing in staging environments before production rollout is recommended to ensure stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.983Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdcfb7

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 7/3/2025, 2:13:09 PM

Last updated: 8/14/2025, 7:39:09 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats