CVE-2024-50133

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's LoongArch architecture allows kernel threads without vDSO mappings to crash when calling stack_top(). This affects systems running Linux with LoongArch processors, potentially causing denial of service through kernel panics.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated, but references indicate stable kernel patches were applied.
Operating Systems: Linux distributions with LoongArch support
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with LoongArch processors. Kernel threads (kthreads) are particularly vulnerable as they lack vDSO mappings.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, requiring physical or remote reboot.

🟠

Likely Case

System instability or crash when kernel threads trigger the vulnerable code path, particularly during testing or specific operations.

🟢

If Mitigated

Minimal impact if systems are patched or don't use LoongArch architecture.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger kernel thread operations.
🏢 Internal Only: MEDIUM - Internal users or processes could trigger crashes affecting system availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering kernel thread operations that call stack_top(), such as through kunit testing framework as shown in the stack trace.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees (commits: 041cc3860b06770357876d1114d615333b0fbf31, 134475a9ab8487527238d270639a8cb74c10aab2, a67d4a02bf43e15544179895ede7d5f97b84b550, a94c197d4d749954dfaa37e907fcc8c04e4aad7e)

Vendor Advisory: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from official distribution repositories. 2. For custom kernels, apply the relevant stable kernel patches. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid kunit testing

linux

Temporarily disable or avoid using kunit testing framework which can trigger the vulnerable code path.

🧯 If You Can't Patch

  • Restrict access to systems to prevent triggering kernel thread operations that could exploit the vulnerability.
  • Monitor systems for kernel panic events and have recovery procedures ready.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and architecture: 'uname -r' and 'uname -m'. If running LoongArch and using unpatched kernel, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update matches patched version and check system stability during kernel thread operations.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • NULL pointer dereference errors mentioning stack_top or vDSO

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "stack_top" OR "vdso")

🔗 References

📤 Share & Export