CVE-2024-50138
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-50138 affects the Linux kernel's BPF ring buffer implementation. The vulnerability was discovered when the function _bpfringbufreserve, which is invoked from a tracepoint that disables preemption, was found to use spinlockt inappropriately. This implementation can lead to a "sleep in atomic" warning in the RT (Real-Time) variant of the kernel (Kernel Patch). The vulnerability affects Linux kernel versions from 5.8 up to (excluding) 6.1.115 and from 6.2 up to (excluding) 6.11.6, as well as several release candidates (NVD).

Technical details

The vulnerability stems from the use of spinlockt in the BPF ring buffer implementation where rawspinlockt should be used instead. When _bpfringbufreserve is called from a tracepoint context with preemption disabled, the use of regular spinlock can trigger a "sleep in atomic" warning in RT kernels. The issue has a CVSS v3.1 Base Score of 5.5 (MEDIUM) with a vector string of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The vulnerability can lead to a denial of service condition in systems running the RT (Real-Time) variant of the Linux kernel. When triggered, it results in a "sleep in atomic" warning and potential system instability (Kernel Patch).

Mitigation and workarounds

The issue has been fixed by switching from spinlockt to rawspinlock_t in the ring buffer implementation. The fix is available in Linux kernel versions 6.1.115, 6.11.6, and later releases. System administrators should update their kernel to a patched version to address this vulnerability (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management