Skip to main content

CVE-2024-53113: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-53113cvecve-2024-53113
Published: Mon Dec 02 2024 (12/02/2024, 13:44:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof We triggered a NULL pointer dereference for ac.preferred_zoneref->zone in alloc_pages_bulk_noprof() when the task is migrated between cpusets. When cpuset is enabled, in prepare_alloc_pages(), ac->nodemask may be &current->mems_allowed. when first_zones_zonelist() is called to find preferred_zoneref, the ac->nodemask may be modified concurrently if the task is migrated between different cpusets. Assuming we have 2 NUMA Node, when traversing Node1 in ac->zonelist, the nodemask is 2, and when traversing Node2 in ac->zonelist, the nodemask is 1. As a result, the ac->preferred_zoneref points to NULL zone. In alloc_pages_bulk_noprof(), for_each_zone_zonelist_nodemask() finds a allowable zone and calls zonelist_node_idx(ac.preferred_zoneref), leading to NULL pointer dereference. __alloc_pages_noprof() fixes this issue by checking NULL pointer in commit ea57485af8f4 ("mm, page_alloc: fix check for NULL preferred_zone") and commit df76cee6bbeb ("mm, page_alloc: remove redundant checks from alloc fastpath"). To fix it, check NULL pointer for preferred_zoneref->zone.

AI-Powered Analysis

AILast updated: 06/28/2025, 15:10:30 UTC

Technical Analysis

CVE-2024-53113 is a vulnerability identified in the Linux kernel's memory management subsystem, specifically within the alloc_pages_bulk_noprof() function. The issue arises due to a NULL pointer dereference triggered when a task is migrated between different cpusets in a NUMA (Non-Uniform Memory Access) environment. The root cause is a race condition involving the ac->nodemask and ac->preferred_zoneref pointers. When cpuset is enabled, the nodemask may be concurrently modified during task migration, leading to ac->preferred_zoneref pointing to a NULL zone. Subsequently, the function alloc_pages_bulk_noprof() attempts to access this NULL pointer, causing a kernel NULL pointer dereference. This can result in a kernel crash (kernel panic) or system instability. The vulnerability was addressed by adding explicit NULL pointer checks for preferred_zoneref->zone in the kernel's page allocation code, preventing dereferencing of NULL pointers. The flaw affects Linux kernel versions prior to the patch and is particularly relevant in systems utilizing cpusets and NUMA configurations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to servers and infrastructure running Linux kernels with cpuset and NUMA enabled, which is common in high-performance computing, cloud environments, and enterprise data centers. Exploitation could lead to denial of service through kernel crashes, impacting availability of critical services. While it does not directly lead to privilege escalation or data leakage, the resulting system instability could disrupt operations, cause downtime, and potentially lead to data loss if systems crash unexpectedly. Organizations relying on Linux-based virtualization hosts or container platforms may also be affected, as kernel crashes can impact multiple tenants or services. Given the widespread use of Linux in European public sector, financial institutions, and technology providers, the vulnerability could have significant operational impact if exploited or triggered inadvertently.

Mitigation Recommendations

Organizations should promptly apply the official Linux kernel patches that address this vulnerability, ensuring that the NULL pointer checks in alloc_pages_bulk_noprof() are in place. For environments where immediate patching is not feasible, consider temporarily disabling cpuset features or restricting task migrations across cpusets and NUMA nodes to reduce exposure. Monitoring kernel logs for signs of NULL pointer dereferences or kernel panics related to memory allocation can help detect attempts to trigger this flaw. Additionally, rigorous testing of kernel updates in staging environments is recommended to validate stability before deployment. Infrastructure teams should also review NUMA and cpuset configurations to ensure they are optimized and do not inadvertently increase risk. Employing kernel live patching solutions where supported can minimize downtime during remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:24.993Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfa29

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 3:10:30 PM

Last updated: 8/14/2025, 3:10:22 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats