CVE-2024-48876

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability in the Linux kernel's stackdepot subsystem could cause deadlock when stack_depot_save_flags() is called from NMI (Non-Maskable Interrupt) context with STACK_DEPOT_FLAG_CAN_ALLOC disabled. This affects Linux systems where stack tracing is enabled and NMIs occur while pool_lock is held, potentially causing system hangs or crashes.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before fixes in stable trees (specific commits: 031e04bdc834cda3b054ef6b698503b2b97e8186, 9bfeeeff2c92b9dd261198b601b45bde4c529841)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires stackdepot functionality enabled (CONFIG_STACKDEPOT=y) and NMIs occurring while pool_lock is held.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System deadlock leading to kernel panic, system crash, or denial of service requiring physical reboot.

🟠

Likely Case

System instability, occasional hangs, or performance degradation when NMIs occur during stack trace operations.

🟢

If Mitigated

Minor performance impact or failed stack trace collection in NMI context without system disruption.

🌐 Internet-Facing: LOW - This is a kernel-level race condition requiring specific timing and system state, not directly exploitable via network.
🏢 Internal Only: MEDIUM - Could affect system stability and availability, particularly on systems with frequent NMIs or heavy debugging/tracing.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires precise timing and specific system state to trigger deadlock.

This is a reliability/DoS issue rather than a privilege escalation or code execution vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees via provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/031e04bdc834cda3b054ef6b698503b2b97e8186

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fixes 2. Reboot system 3. Verify kernel version after reboot

🔧 Temporary Workarounds

Disable stackdepot

linux

Disable CONFIG_STACKDEPOT kernel configuration to avoid the vulnerable code path

Rebuild kernel with CONFIG_STACKDEPOT=n

Reduce NMI frequency

linux

Configure system to minimize Non-Maskable Interrupts where possible

Check /proc/interrupts for NMI counts
Adjust hardware/perf monitoring settings

🧯 If You Can't Patch

  • Monitor system for unexplained hangs or crashes and maintain current backups
  • Isolate affected systems from critical production workloads where possible

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if stackdepot is enabled: grep CONFIG_STACKDEPOT /boot/config-$(uname -r)

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and system stability during stress/performance testing

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • System hang/crash reports in /var/log/messages or journalctl
  • NMI watchdog timeouts

Network Indicators:

  • None - this is a local kernel issue

SIEM Query:

Search for: 'kernel panic', 'NMI', 'deadlock', 'stackdepot' in system logs

🔗 References

📤 Share & Export