CVE-2024-47744
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-47744 affects the Linux kernel and involves a potential deadlock in the KVM (Kernel-based Virtual Machine) subsystem. The vulnerability was discovered in the usage count protection mechanism where a chain of locks and SRCU synchronizations on x86 systems could lead to a deadlock condition (Kernel Patch). The issue affects Linux kernel versions from 6.3 up to 6.6.54, 6.7 up to 6.10.13, and 6.11 up to 6.11.2 (NVD).

Technical details

The vulnerability stems from a circular locking dependency in the KVM subsystem. The deadlock occurs due to a chain of locks and SRCU synchronizations involving CPU0, CPU1, and CPU2, where CPU1 waits on CPU0, CPU0 waits on CPU2, and CPU2 waits on CPU1 if there's a writer. The issue specifically involves the kvmusagecount protection mechanism and its interaction with various locks including slots_lock, vcpu mutex, and SRCU synchronization (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) (NVD).

Impact

The vulnerability can result in a system deadlock, potentially causing a denial of service condition in affected systems. While the impact is significant from an availability perspective, there are no direct implications for confidentiality or integrity of the system (NVD).

Mitigation and workarounds

The issue has been fixed by introducing a dedicated mutex (kvmusagelock) to guard kvmusagecount, replacing the previous implementation that used kvm_lock. This solution prevents the potential deadlock by avoiding the circular dependency chain. Users should update to patched kernel versions: Linux kernel 6.6.54 or later, 6.10.13 or later, or 6.11.2 or later (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management