Skip to main content

CVE-2024-53174: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-53174cvecve-2024-53174
Published: Fri Dec 27 2024 (12/27/2024, 13:49:18 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: make sure cache entry active before cache_show The function `c_show` was called with protection from RCU. This only ensures that `cp` will not be freed. Therefore, the reference count for `cp` can drop to zero, which will trigger a refcount use-after-free warning when `cache_get` is called. To resolve this issue, use `cache_get_rcu` to ensure that `cp` remains active. ------------[ cut here ]------------ refcount_t: addition on 0; use-after-free. WARNING: CPU: 7 PID: 822 at lib/refcount.c:25 refcount_warn_saturate+0xb1/0x120 CPU: 7 UID: 0 PID: 822 Comm: cat Not tainted 6.12.0-rc3+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014 RIP: 0010:refcount_warn_saturate+0xb1/0x120 Call Trace: <TASK> c_show+0x2fc/0x380 [sunrpc] seq_read_iter+0x589/0x770 seq_read+0x1e5/0x270 proc_reg_read+0xe1/0x140 vfs_read+0x125/0x530 ksys_read+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e

AI-Powered Analysis

AILast updated: 07/02/2025, 22:55:33 UTC

Technical Analysis

CVE-2024-53174 is a high-severity vulnerability in the Linux kernel related to the SUNRPC subsystem, specifically involving a use-after-free condition in the cache management code. The vulnerability arises because the function c_show was called with Read-Copy-Update (RCU) protection, which only guarantees that the cache pointer (cp) will not be freed during the operation. However, this protection does not prevent the reference count of cp from dropping to zero, which can lead to a use-after-free scenario when cache_get is subsequently called. This is a classic reference count use-after-free vulnerability (CWE-416), where the reference count can be decremented to zero and the object freed, but a stale pointer is still used afterward. The kernel log snippet included in the description shows a refcount warning triggered during execution, indicating the presence of this flaw. The fix involves replacing cache_get with cache_get_rcu to ensure the cache entry remains active and its reference count is properly maintained during the operation. The vulnerability affects Linux kernel versions prior to the patch and is exploitable locally with low attack complexity and low privileges required (PR:L), without user interaction (UI:N). The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability due to potential arbitrary code execution or denial of service. No known exploits are currently reported in the wild, but the vulnerability's nature and kernel-level impact make it a significant risk once weaponized. The affected versions are identified by a specific commit hash, indicating the vulnerability is in recent or development kernel versions (6.12.0-rc3+).

Potential Impact

For European organizations, this vulnerability poses a significant risk because Linux is widely deployed across servers, cloud infrastructure, embedded devices, and critical systems. Exploitation could allow local attackers or compromised low-privilege users to escalate privileges, execute arbitrary code in kernel context, or cause denial of service by crashing the system. This could lead to data breaches, service outages, and disruption of business operations. Organizations relying on Linux-based infrastructure for web hosting, cloud services, telecommunications, or industrial control systems could be particularly affected. The high impact on confidentiality, integrity, and availability means sensitive data could be exposed or corrupted, and critical services could be interrupted. The lack of known exploits currently provides a window for proactive patching, but the vulnerability's presence in the kernel means that once exploits emerge, the impact could be widespread and severe. Additionally, the vulnerability could be leveraged in multi-stage attacks targeting European critical infrastructure or enterprises, especially those with remote access or multi-user environments where local privilege escalation is a common attack vector.

Mitigation Recommendations

European organizations should immediately assess their Linux kernel versions and prioritize patching to the latest stable kernel releases that include the fix for CVE-2024-53174. Since the vulnerability requires local access, organizations should also strengthen access controls to limit untrusted user logins and employ strict privilege separation. Implement kernel live patching where possible to reduce downtime during patch deployment. Conduct thorough audits of systems running vulnerable kernels, especially those exposed to multiple users or untrusted code execution. Employ runtime security tools that can detect anomalous kernel behavior or refcount misuse. For environments where immediate patching is not feasible, consider disabling or restricting SUNRPC services if not required, as this subsystem is directly involved. Maintain robust monitoring and alerting for kernel crashes or refcount warnings in system logs, which could indicate exploitation attempts. Finally, ensure that endpoint security solutions are updated to detect potential exploit attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:25.007Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdee26

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 7/2/2025, 10:55:33 PM

Last updated: 8/4/2025, 4:27:58 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats