CVE-2024-53174: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: make sure cache entry active before cache_show The function `c_show` was called with protection from RCU. This only ensures that `cp` will not be freed. Therefore, the reference count for `cp` can drop to zero, which will trigger a refcount use-after-free warning when `cache_get` is called. To resolve this issue, use `cache_get_rcu` to ensure that `cp` remains active. ------------[ cut here ]------------ refcount_t: addition on 0; use-after-free. WARNING: CPU: 7 PID: 822 at lib/refcount.c:25 refcount_warn_saturate+0xb1/0x120 CPU: 7 UID: 0 PID: 822 Comm: cat Not tainted 6.12.0-rc3+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014 RIP: 0010:refcount_warn_saturate+0xb1/0x120 Call Trace: <TASK> c_show+0x2fc/0x380 [sunrpc] seq_read_iter+0x589/0x770 seq_read+0x1e5/0x270 proc_reg_read+0xe1/0x140 vfs_read+0x125/0x530 ksys_read+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e
AI Analysis
Technical Summary
CVE-2024-53174 is a high-severity vulnerability in the Linux kernel related to the SUNRPC subsystem, specifically involving a use-after-free condition in the cache management code. The vulnerability arises because the function c_show was called with Read-Copy-Update (RCU) protection, which only guarantees that the cache pointer (cp) will not be freed during the operation. However, this protection does not prevent the reference count of cp from dropping to zero, which can lead to a use-after-free scenario when cache_get is subsequently called. This is a classic reference count use-after-free vulnerability (CWE-416), where the reference count can be decremented to zero and the object freed, but a stale pointer is still used afterward. The kernel log snippet included in the description shows a refcount warning triggered during execution, indicating the presence of this flaw. The fix involves replacing cache_get with cache_get_rcu to ensure the cache entry remains active and its reference count is properly maintained during the operation. The vulnerability affects Linux kernel versions prior to the patch and is exploitable locally with low attack complexity and low privileges required (PR:L), without user interaction (UI:N). The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability due to potential arbitrary code execution or denial of service. No known exploits are currently reported in the wild, but the vulnerability's nature and kernel-level impact make it a significant risk once weaponized. The affected versions are identified by a specific commit hash, indicating the vulnerability is in recent or development kernel versions (6.12.0-rc3+).
Potential Impact
For European organizations, this vulnerability poses a significant risk because Linux is widely deployed across servers, cloud infrastructure, embedded devices, and critical systems. Exploitation could allow local attackers or compromised low-privilege users to escalate privileges, execute arbitrary code in kernel context, or cause denial of service by crashing the system. This could lead to data breaches, service outages, and disruption of business operations. Organizations relying on Linux-based infrastructure for web hosting, cloud services, telecommunications, or industrial control systems could be particularly affected. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or corrupted, and critical services could be interrupted. The lack of known exploits currently provides a window for proactive patching, but the vulnerability's presence in the kernel means that once exploits emerge, the impact could be widespread and severe. Additionally, the vulnerability could be leveraged in multi-stage attacks targeting European critical infrastructure or enterprises, especially those with remote access or multi-user environments where local privilege escalation is a common attack vector.
Mitigation Recommendations
European organizations should immediately assess their Linux kernel versions and prioritize patching to the latest stable kernel releases that include the fix for CVE-2024-53174. Since the vulnerability requires local access, organizations should also strengthen access controls to limit untrusted user logins and employ strict privilege separation. Implement kernel live patching where possible to reduce downtime during patch deployment. Conduct thorough audits of systems running vulnerable kernels, especially those exposed to multiple users or untrusted code execution. Employ runtime security tools that can detect anomalous kernel behavior or refcount misuse. For environments where immediate patching is not feasible, consider disabling or restricting SUNRPC services if not required, as this subsystem is directly involved. Maintain robust monitoring and alerting for kernel crashes or refcount warnings in system logs, which could indicate exploitation attempts. Finally, ensure that endpoint security solutions are updated to detect potential exploit attempts targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-53174: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: make sure cache entry active before cache_show The function `c_show` was called with protection from RCU. This only ensures that `cp` will not be freed. Therefore, the reference count for `cp` can drop to zero, which will trigger a refcount use-after-free warning when `cache_get` is called. To resolve this issue, use `cache_get_rcu` to ensure that `cp` remains active. ------------[ cut here ]------------ refcount_t: addition on 0; use-after-free. WARNING: CPU: 7 PID: 822 at lib/refcount.c:25 refcount_warn_saturate+0xb1/0x120 CPU: 7 UID: 0 PID: 822 Comm: cat Not tainted 6.12.0-rc3+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014 RIP: 0010:refcount_warn_saturate+0xb1/0x120 Call Trace: <TASK> c_show+0x2fc/0x380 [sunrpc] seq_read_iter+0x589/0x770 seq_read+0x1e5/0x270 proc_reg_read+0xe1/0x140 vfs_read+0x125/0x530 ksys_read+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e
AI-Powered Analysis
Technical Analysis
CVE-2024-53174 is a high-severity vulnerability in the Linux kernel related to the SUNRPC subsystem, specifically involving a use-after-free condition in the cache management code. The vulnerability arises because the function c_show was called with Read-Copy-Update (RCU) protection, which only guarantees that the cache pointer (cp) will not be freed during the operation. However, this protection does not prevent the reference count of cp from dropping to zero, which can lead to a use-after-free scenario when cache_get is subsequently called. This is a classic reference count use-after-free vulnerability (CWE-416), where the reference count can be decremented to zero and the object freed, but a stale pointer is still used afterward. The kernel log snippet included in the description shows a refcount warning triggered during execution, indicating the presence of this flaw. The fix involves replacing cache_get with cache_get_rcu to ensure the cache entry remains active and its reference count is properly maintained during the operation. The vulnerability affects Linux kernel versions prior to the patch and is exploitable locally with low attack complexity and low privileges required (PR:L), without user interaction (UI:N). The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability due to potential arbitrary code execution or denial of service. No known exploits are currently reported in the wild, but the vulnerability's nature and kernel-level impact make it a significant risk once weaponized. The affected versions are identified by a specific commit hash, indicating the vulnerability is in recent or development kernel versions (6.12.0-rc3+).
Potential Impact
For European organizations, this vulnerability poses a significant risk because Linux is widely deployed across servers, cloud infrastructure, embedded devices, and critical systems. Exploitation could allow local attackers or compromised low-privilege users to escalate privileges, execute arbitrary code in kernel context, or cause denial of service by crashing the system. This could lead to data breaches, service outages, and disruption of business operations. Organizations relying on Linux-based infrastructure for web hosting, cloud services, telecommunications, or industrial control systems could be particularly affected. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or corrupted, and critical services could be interrupted. The lack of known exploits currently provides a window for proactive patching, but the vulnerability's presence in the kernel means that once exploits emerge, the impact could be widespread and severe. Additionally, the vulnerability could be leveraged in multi-stage attacks targeting European critical infrastructure or enterprises, especially those with remote access or multi-user environments where local privilege escalation is a common attack vector.
Mitigation Recommendations
European organizations should immediately assess their Linux kernel versions and prioritize patching to the latest stable kernel releases that include the fix for CVE-2024-53174. Since the vulnerability requires local access, organizations should also strengthen access controls to limit untrusted user logins and employ strict privilege separation. Implement kernel live patching where possible to reduce downtime during patch deployment. Conduct thorough audits of systems running vulnerable kernels, especially those exposed to multiple users or untrusted code execution. Employ runtime security tools that can detect anomalous kernel behavior or refcount misuse. For environments where immediate patching is not feasible, consider disabling or restricting SUNRPC services if not required, as this subsystem is directly involved. Maintain robust monitoring and alerting for kernel crashes or refcount warnings in system logs, which could indicate exploitation attempts. Finally, ensure that endpoint security solutions are updated to detect potential exploit attempts targeting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-11-19T17:17:25.007Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9823c4522896dcbdee26
Added to database: 5/21/2025, 9:08:51 AM
Last enriched: 7/2/2025, 10:55:33 PM
Last updated: 8/4/2025, 4:27:58 PM
Views: 12
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.