Skip to main content

CVE-2024-57875: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-57875cvecve-2024-57875
Published: Sat Jan 11 2025 (01/11/2025, 14:49:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: block: RCU protect disk->conv_zones_bitmap Ensure that a disk revalidation changing the conventional zones bitmap of a disk does not cause invalid memory references when using the disk_zone_is_conv() helper by RCU protecting the disk->conv_zones_bitmap pointer. disk_zone_is_conv() is modified to operate under the RCU read lock and the function disk_set_conv_zones_bitmap() is added to update a disk conv_zones_bitmap pointer using rcu_replace_pointer() with the disk zone_wplugs_lock spinlock held. disk_free_zone_resources() is modified to call disk_update_zone_resources() with a NULL bitmap pointer to free the disk conv_zones_bitmap. disk_set_conv_zones_bitmap() is also used in disk_update_zone_resources() to set the new (revalidated) bitmap and free the old one.

AI-Powered Analysis

AILast updated: 06/28/2025, 08:26:07 UTC

Technical Analysis

CVE-2024-57875 is a vulnerability identified in the Linux kernel related to the handling of disk zone metadata, specifically the conventional zones bitmap (conv_zones_bitmap) used in zoned block devices. Zoned block devices partition storage into zones, some of which are conventional and others sequential, requiring careful management of zone metadata. The vulnerability arises from improper synchronization when updating the conv_zones_bitmap pointer during disk revalidation operations. Without proper protection, concurrent access to this pointer can lead to invalid memory references, potentially causing kernel crashes or undefined behavior. The fix involves introducing Read-Copy-Update (RCU) synchronization mechanisms to protect the conv_zones_bitmap pointer. The disk_zone_is_conv() helper function is modified to operate under an RCU read lock, ensuring safe concurrent reads. Additionally, a new function disk_set_conv_zones_bitmap() is introduced to update the pointer safely using rcu_replace_pointer() while holding the disk_zone_wplugs_lock spinlock. The patch also modifies disk_free_zone_resources() and disk_update_zone_resources() to correctly manage the lifecycle of the bitmap pointer, preventing use-after-free or dangling pointer issues. This vulnerability is technical and low-level, affecting the Linux kernel's block device subsystem, specifically zoned block device support. It does not require user interaction or authentication but depends on the kernel version and configuration supporting zoned block devices. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-57875 depends largely on their use of Linux systems with zoned block device support enabled. Zoned block devices are increasingly used in high-performance storage environments, such as data centers and enterprise servers, to optimize storage efficiency. A successful exploitation could lead to kernel crashes or memory corruption, resulting in denial of service (DoS) conditions or potential escalation of privileges if attackers can leverage the memory corruption further. This could disrupt critical services, data processing, or storage availability. Given the kernel-level nature of the vulnerability, it could affect a wide range of Linux distributions used in European enterprises, cloud providers, and public sector infrastructure. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation. Organizations with storage-intensive workloads or those using zoned block devices in their infrastructure should prioritize patching to maintain system stability and security.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Identify Linux systems running kernel versions affected by this vulnerability, especially those with zoned block device support enabled. 2) Apply the official Linux kernel patches that introduce RCU protection for conv_zones_bitmap as soon as they become available from trusted Linux distribution vendors or the Linux kernel mainline. 3) For environments where immediate patching is not feasible, consider disabling zoned block device support if it is not critical to operations, to reduce exposure. 4) Monitor kernel logs and system stability closely for signs of memory corruption or crashes related to block device operations. 5) Incorporate this vulnerability into vulnerability management and patching workflows, ensuring timely updates. 6) Engage with Linux distribution vendors for backported patches and security advisories relevant to your environment. 7) Test patched kernels in staging environments to ensure compatibility and stability before wide deployment. These steps go beyond generic advice by focusing on the specific kernel subsystem and operational context of zoned block devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-01-11T14:45:42.023Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde925

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 8:26:07 AM

Last updated: 7/27/2025, 11:57:05 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats