CVE-2024-50277

4.7 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's device mapper (dm) subsystem causes a kernel crash when blk_alloc_disk fails during device creation. This affects systems using device mapper functionality like LVM, software RAID, or dm-crypt. The vulnerability leads to denial of service but does not allow privilege escalation or data corruption.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches available for stable kernel branches.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only exploitable when device mapper functionality is used and blk_alloc_disk fails, which is a rare error condition.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash/kernel panic requiring reboot, causing service disruption and potential data loss if unsaved.

🟠

Likely Case

Local denial of service when creating device mapper devices under specific error conditions.

🟢

If Mitigated

Minimal impact with proper monitoring and automated recovery systems in place.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger device mapper operations.
🏢 Internal Only: MEDIUM - Could be triggered by privileged users or automated processes creating device mapper devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires triggering specific error condition during device mapper operations.

Exploitation requires local access and ability to create device mapper devices, typically requiring root or CAP_SYS_ADMIN.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches via git commits d7aec2a06730b774a97caaf48cbbc58330a85829 and fed13a5478680614ba97fc87e71f16e2e197912e

Vendor Advisory: https://git.kernel.org/stable/c/d7aec2a06730b774a97caaf48cbbc58330a85829

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Restrict device mapper operations

linux

Limit which users can create device mapper devices using capabilities or SELinux/AppArmor policies.

setcap -r /usr/sbin/dmsetup
chmod 750 /usr/sbin/dmsetup

🧯 If You Can't Patch

  • Monitor system logs for kernel panic or oops messages related to device mapper
  • Implement automated recovery procedures for system crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution's patched versions. Vulnerable if using unpatched kernel with device mapper support.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version matches patched version from vendor and test device mapper operations.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Oops messages mentioning device mapper or blk_alloc_disk
  • System crash/reboot logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("panic" OR "Oops") AND ("device-mapper" OR "dm-" OR "blk_alloc_disk")

🔗 References

📤 Share & Export