Skip to main content

CVE-2024-53172: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-53172cvecve-2024-53172
Published: Fri Dec 27 2024 (12/27/2024, 13:49:17 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ubi: fastmap: Fix duplicate slab cache names while attaching Since commit 4c39529663b9 ("slab: Warn on duplicate cache names when DEBUG_VM=y"), the duplicate slab cache names can be detected and a kernel WARNING is thrown out. In UBI fast attaching process, alloc_ai() could be invoked twice with the same slab cache name 'ubi_aeb_slab_cache', which will trigger following warning messages: kmem_cache of name 'ubi_aeb_slab_cache' already exists WARNING: CPU: 0 PID: 7519 at mm/slab_common.c:107 __kmem_cache_create_args+0x100/0x5f0 Modules linked in: ubi(+) nandsim [last unloaded: nandsim] CPU: 0 UID: 0 PID: 7519 Comm: modprobe Tainted: G 6.12.0-rc2 RIP: 0010:__kmem_cache_create_args+0x100/0x5f0 Call Trace: __kmem_cache_create_args+0x100/0x5f0 alloc_ai+0x295/0x3f0 [ubi] ubi_attach+0x3c3/0xcc0 [ubi] ubi_attach_mtd_dev+0x17cf/0x3fa0 [ubi] ubi_init+0x3fb/0x800 [ubi] do_init_module+0x265/0x7d0 __x64_sys_finit_module+0x7a/0xc0 The problem could be easily reproduced by loading UBI device by fastmap with CONFIG_DEBUG_VM=y. Fix it by using different slab names for alloc_ai() callers.

AI-Powered Analysis

AILast updated: 06/28/2025, 10:26:03 UTC

Technical Analysis

CVE-2024-53172 is a vulnerability identified in the Linux kernel related to the UBI (Unsorted Block Images) subsystem, specifically within the fastmap feature used for attaching UBI devices. The issue arises from the allocation function alloc_ai() being invoked twice with the same slab cache name 'ubi_aeb_slab_cache'. This results in duplicate slab cache names, which triggers kernel warnings and can lead to instability or unexpected behavior. The problem is detectable when CONFIG_DEBUG_VM=y is enabled, as the kernel emits warnings about duplicate slab cache names. The root cause is that the slab allocator, which manages memory caches in the kernel, does not expect multiple caches with the same name, leading to a warning and potential resource conflicts. The fix involves assigning unique slab cache names for each alloc_ai() caller to prevent duplication. While the vulnerability does not appear to have an associated CVSS score or known exploits in the wild, it affects the Linux kernel versions identified by the commit hash d2158f69a7d469c21c37f7028c18aa8c54707de3 and potentially others in the 6.12.0-rc2 development cycle. The vulnerability is primarily a stability and reliability issue rather than a direct code execution or privilege escalation flaw. However, kernel warnings and potential crashes can impact system availability and reliability, especially in embedded or storage systems relying on UBI for flash memory management.

Potential Impact

For European organizations, the impact of CVE-2024-53172 depends on the extent to which they deploy Linux systems utilizing the UBI fastmap feature, commonly found in embedded devices, IoT systems, and specialized storage appliances. Organizations in sectors such as telecommunications, automotive, industrial control systems, and critical infrastructure that rely on Linux-based embedded devices with flash storage could experience system instability or unexpected reboots if this vulnerability is triggered. Although the vulnerability does not directly lead to privilege escalation or data leakage, the resulting kernel warnings and potential crashes can cause denial of service conditions, affecting operational continuity. This is particularly critical for industrial and infrastructure environments where uptime and reliability are paramount. Additionally, debugging and maintenance efforts may increase due to the kernel warnings, potentially leading to increased operational costs and downtime. Since no known exploits are currently reported, the immediate risk is moderate, but unpatched systems remain vulnerable to stability issues.

Mitigation Recommendations

To mitigate CVE-2024-53172, organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability, ensuring that the fix involving unique slab cache names for alloc_ai() callers is included. 2) For embedded and IoT devices, coordinate with hardware and software vendors to obtain updated firmware or kernel versions incorporating the fix. 3) Enable kernel debugging and monitoring tools to detect duplicate slab cache warnings proactively, especially in development or testing environments, to identify affected systems before deployment. 4) Avoid enabling CONFIG_DEBUG_VM in production unless necessary, as it triggers the detection of this issue; however, this should not be a substitute for patching. 5) Implement robust system monitoring and alerting to detect kernel warnings and crashes related to UBI fastmap operations to respond quickly to potential instability. 6) For critical systems, consider fallback or redundancy mechanisms to maintain availability in case of kernel instability. These steps go beyond generic advice by focusing on patch management, vendor coordination, proactive detection, and operational resilience specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:25.006Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdee1a

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 10:26:03 AM

Last updated: 8/4/2025, 12:26:17 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats