CVE-2024-45023

7.1 HIGH

📋 TL;DR

A race condition in Linux kernel's RAID1 implementation can cause data corruption when reading from degraded arrays with slow disks. This vulnerability allows reading unrecovered data from disks still undergoing recovery, potentially returning stale or incorrect data. Systems using Linux software RAID1 with mixed-speed disks in degraded state are affected.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Kernel versions containing the vulnerable md/raid1 code prior to fixes in commits 2febf5fdbf5d9a52ddc3e986971c8609b1582d67 and c916ca35308d3187c9928664f9be249b22a3a701
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Linux software RAID1 (mdraid) with arrays in degraded state containing disks with different performance characteristics.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical data corruption leading to filesystem damage, application crashes, or data loss from reading incorrect data during degraded RAID1 operations.

🟠

Likely Case

Intermittent data corruption during read operations when RAID1 arrays are degraded and contain disks with different performance characteristics.

🟢

If Mitigated

Minimal impact if RAID arrays are healthy, properly monitored, and degraded states are promptly addressed.

🌐 Internet-Facing: LOW - This is a storage subsystem vulnerability requiring local access to affected RAID arrays.
🏢 Internal Only: MEDIUM - Affects systems with RAID1 configurations, particularly those with mixed-speed disks that may experience degradation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires specific RAID1 degraded state with mixed-speed disks and timing conditions.

Exploitation requires local access and specific RAID configuration conditions. This is a race condition rather than a direct security bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 2febf5fdbf5d9a52ddc3e986971c8609b1582d67 and c916ca35308d3187c9928664f9be249b22a3a701

Vendor Advisory: https://git.kernel.org/stable/c/2febf5fdbf5d9a52ddc3e986971c8609b1582d67

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version and that mdraid module loads correctly.

🔧 Temporary Workarounds

Avoid degraded RAID1 arrays

linux

Maintain RAID1 arrays in healthy state and promptly replace failed disks

mdadm --detail /dev/mdX
cat /proc/mdstat

Use homogeneous disk speeds

linux

Ensure all disks in RAID1 arrays have similar performance characteristics

🧯 If You Can't Patch

  • Monitor RAID arrays closely and immediately address any degraded states
  • Implement regular data integrity checks and backups for critical data on RAID1 arrays

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if using software RAID1: uname -r && cat /proc/mdstat

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fixes: grep -q '2febf5fdbf5d9a52ddc3e986971c8609b1582d67\|c916ca35308d3187c9928664f9be249b22a3a701' /proc/version_signature || echo 'Check kernel source'

📡 Detection & Monitoring

Log Indicators:

  • Kernel messages about RAID degradation
  • mdraid error messages in dmesg
  • Filesystem corruption errors

Network Indicators:

  • None - this is a local storage vulnerability

SIEM Query:

source="kernel" AND ("mdraid" OR "RAID1") AND ("degraded" OR "error" OR "corruption")

🔗 References

📤 Share & Export