Skip to main content

CVE-2024-53182: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-53182cvecve-2024-53182
Published: Fri Dec 27 2024 (12/27/2024, 13:49:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Revert "block, bfq: merge bfq_release_process_ref() into bfq_put_cooperator()" This reverts commit bc3b1e9e7c50e1de0f573eea3871db61dd4787de. The bic is associated with sync_bfqq, and bfq_release_process_ref cannot be put into bfq_put_cooperator. kasan report: [ 400.347277] ================================================================== [ 400.347287] BUG: KASAN: slab-use-after-free in bic_set_bfqq+0x200/0x230 [ 400.347420] Read of size 8 at addr ffff88881cab7d60 by task dockerd/5800 [ 400.347430] [ 400.347436] CPU: 24 UID: 0 PID: 5800 Comm: dockerd Kdump: loaded Tainted: G E 6.12.0 #32 [ 400.347450] Tainted: [E]=UNSIGNED_MODULE [ 400.347454] Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.20192059.B64.2207280713 07/28/2022 [ 400.347460] Call Trace: [ 400.347464] <TASK> [ 400.347468] dump_stack_lvl+0x5d/0x80 [ 400.347490] print_report+0x174/0x505 [ 400.347521] kasan_report+0xe0/0x160 [ 400.347541] bic_set_bfqq+0x200/0x230 [ 400.347549] bfq_bic_update_cgroup+0x419/0x740 [ 400.347560] bfq_bio_merge+0x133/0x320 [ 400.347584] blk_mq_submit_bio+0x1761/0x1e20 [ 400.347625] __submit_bio+0x28b/0x7b0 [ 400.347664] submit_bio_noacct_nocheck+0x6b2/0xd30 [ 400.347690] iomap_readahead+0x50c/0x680 [ 400.347731] read_pages+0x17f/0x9c0 [ 400.347785] page_cache_ra_unbounded+0x366/0x4a0 [ 400.347795] filemap_fault+0x83d/0x2340 [ 400.347819] __xfs_filemap_fault+0x11a/0x7d0 [xfs] [ 400.349256] __do_fault+0xf1/0x610 [ 400.349270] do_fault+0x977/0x11a0 [ 400.349281] __handle_mm_fault+0x5d1/0x850 [ 400.349314] handle_mm_fault+0x1f8/0x560 [ 400.349324] do_user_addr_fault+0x324/0x970 [ 400.349337] exc_page_fault+0x76/0xf0 [ 400.349350] asm_exc_page_fault+0x26/0x30 [ 400.349360] RIP: 0033:0x55a480d77375 [ 400.349384] Code: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 49 3b 66 10 0f 86 ae 02 00 00 55 48 89 e5 48 83 ec 58 48 8b 10 <83> 7a 10 00 0f 84 27 02 00 00 44 0f b6 42 28 44 0f b6 4a 29 41 80 [ 400.349392] RSP: 002b:00007f18c37fd8b8 EFLAGS: 00010216 [ 400.349401] RAX: 00007f18c37fd9d0 RBX: 0000000000000000 RCX: 0000000000000000 [ 400.349407] RDX: 000055a484407d38 RSI: 000000c000e8b0c0 RDI: 0000000000000000 [ 400.349412] RBP: 00007f18c37fd910 R08: 000055a484017f60 R09: 000055a484066f80 [ 400.349417] R10: 0000000000194000 R11: 0000000000000005 R12: 0000000000000008 [ 400.349422] R13: 0000000000000000 R14: 000000c000476a80 R15: 0000000000000000 [ 400.349430] </TASK> [ 400.349452] [ 400.349454] Allocated by task 5800: [ 400.349459] kasan_save_stack+0x30/0x50 [ 400.349469] kasan_save_track+0x14/0x30 [ 400.349475] __kasan_slab_alloc+0x89/0x90 [ 400.349482] kmem_cache_alloc_node_noprof+0xdc/0x2a0 [ 400.349492] bfq_get_queue+0x1ef/0x1100 [ 400.349502] __bfq_get_bfqq_handle_split+0x11a/0x510 [ 400.349511] bfq_insert_requests+0xf55/0x9030 [ 400.349519] blk_mq_flush_plug_list+0x446/0x14c0 [ 400.349527] __blk_flush_plug+0x27c/0x4e0 [ 400.349534] blk_finish_plug+0x52/0xa0 [ 400.349540] _xfs_buf_ioapply+0x739/0xc30 [xfs] [ 400.350246] __xfs_buf_submit+0x1b2/0x640 [xfs] [ 400.350967] xfs_buf_read_map+0x306/0xa20 [xfs] [ 400.351672] xfs_trans_read_buf_map+0x285/0x7d0 [xfs] [ 400.352386] xfs_imap_to_bp+0x107/0x270 [xfs] [ 400.353077] xfs_iget+0x70d/0x1eb0 [xfs] [ 400.353786] xfs_lookup+0x2ca/0x3a0 [xfs] [ 400.354506] xfs_vn_lookup+0x14e/0x1a0 [xfs] [ 400.355197] __lookup_slow+0x19c/0x340 [ 400.355204] lookup_one_unlocked+0xfc/0x120 [ 400.355211] ovl_lookup_single+0x1b3/0xcf0 [overlay] [ 400.355255] ovl_lookup_layer+0x316/0x490 [overlay] [ 400.355295] ovl_lookup+0x844/0x1fd0 [overlay] [ 400.355351] lookup_one_qstr_excl+0xef/0x150 [ 400.355357] do_unlinkat+0x22a/0x620 [ 400.355366] __x64_sys_unlinkat+0x109/0x1e0 [ 400.355375] do_syscall_64+0x82/0x160 [ 400.355384] entry_SYSCALL_64_after_hwframe+0x76/0x7 ---truncated---

AI-Powered Analysis

AILast updated: 07/02/2025, 22:56:46 UTC

Technical Analysis

CVE-2024-53182 is a high-severity vulnerability identified in the Linux kernel, specifically related to the block layer's BFQ (Budget Fair Queueing) I/O scheduler implementation. The vulnerability stems from a use-after-free condition in the function bic_set_bfqq, which is part of the BFQ block I/O context management. This issue arose due to an improper merge of the bfq_release_process_ref() function into bfq_put_cooperator(), which was later reverted to address the problem. The kernel's KASAN (Kernel Address Sanitizer) detected a slab-use-after-free error, indicating that memory was accessed after being freed, leading to potential memory corruption. The bug trace shows that the flaw can be triggered during block I/O operations, particularly involving cgroup updates and bio merges, which are common in containerized environments (e.g., the task 'dockerd' is mentioned). The vulnerability affects Linux kernel versions containing the reverted commit bc3b1e9e7c50e1de0f573eea3871db61dd4787de. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring local privileges and no user interaction. Exploitation could allow a local attacker with limited privileges to execute arbitrary code in kernel context, cause denial of service through kernel crashes, or escalate privileges by corrupting kernel memory. No known exploits are currently reported in the wild, but the presence of this vulnerability in widely deployed Linux kernels, especially in environments running containerized workloads, raises significant security concerns.

Potential Impact

For European organizations, the impact of CVE-2024-53182 is substantial given the widespread use of Linux in servers, cloud infrastructure, and container orchestration platforms such as Docker and Kubernetes. Organizations relying on Linux-based systems for critical infrastructure, cloud services, or data centers could face risks of service disruption, data breaches, or privilege escalation attacks. The vulnerability's exploitation could lead to unauthorized access to sensitive data, disruption of business-critical applications, and potential lateral movement within networks. This is particularly concerning for sectors such as finance, healthcare, telecommunications, and government agencies in Europe, which often use Linux servers for backend operations and containerized environments. Additionally, the vulnerability could affect managed service providers and cloud operators hosting European customers, amplifying the risk. Given the kernel-level nature of the flaw, remediation delays could expose organizations to persistent threats and complicate incident response efforts.

Mitigation Recommendations

1. Immediate application of the official Linux kernel patches that revert the problematic commit (bc3b1e9e7c50e1de0f573eea3871db61dd4787de) is critical. Organizations should prioritize updating kernels to versions where this vulnerability is fixed. 2. For environments where immediate patching is challenging, restrict local access to trusted users only, as exploitation requires local privileges. 3. Implement strict container runtime security policies and isolate container workloads to minimize the risk of privilege escalation via compromised containers. 4. Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. 5. Monitor system logs and kernel crash reports for signs of exploitation attempts or unusual block I/O behavior. 6. Coordinate with Linux distribution vendors and cloud providers to ensure timely updates and verify that their kernels incorporate the fix. 7. Conduct thorough vulnerability scanning and penetration testing focusing on kernel vulnerabilities and container security postures. 8. Educate system administrators and security teams about the risks of kernel-level vulnerabilities and the importance of prompt patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:25.009Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdee7b

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 7/2/2025, 10:56:46 PM

Last updated: 8/4/2025, 12:41:17 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats