Skip to main content

CVE-2024-44984: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-44984cvecve-2024-44984
Published: Wed Sep 04 2024 (09/04/2024, 19:54:33 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT Remove the dma_unmap_page_attrs() call in the driver's XDP_REDIRECT code path. This should have been removed when we let the page pool handle the DMA mapping. This bug causes the warning: WARNING: CPU: 7 PID: 59 at drivers/iommu/dma-iommu.c:1198 iommu_dma_unmap_page+0xd5/0x100 CPU: 7 PID: 59 Comm: ksoftirqd/7 Tainted: G W 6.8.0-1010-gcp #11-Ubuntu Hardware name: Dell Inc. PowerEdge R7525/0PYVT1, BIOS 2.15.2 04/02/2024 RIP: 0010:iommu_dma_unmap_page+0xd5/0x100 Code: 89 ee 48 89 df e8 cb f2 69 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9 31 f6 31 ff 45 31 c0 e9 ab 17 71 00 <0f> 0b 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9 RSP: 0018:ffffab1fc0597a48 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff99ff838280c8 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffab1fc0597a78 R08: 0000000000000002 R09: ffffab1fc0597c1c R10: ffffab1fc0597cd3 R11: ffff99ffe375acd8 R12: 00000000e65b9000 R13: 0000000000000050 R14: 0000000000001000 R15: 0000000000000002 FS: 0000000000000000(0000) GS:ffff9a06efb80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000565c34c37210 CR3: 00000005c7e3e000 CR4: 0000000000350ef0 ? show_regs+0x6d/0x80 ? __warn+0x89/0x150 ? iommu_dma_unmap_page+0xd5/0x100 ? report_bug+0x16a/0x190 ? handle_bug+0x51/0xa0 ? exc_invalid_op+0x18/0x80 ? iommu_dma_unmap_page+0xd5/0x100 ? iommu_dma_unmap_page+0x35/0x100 dma_unmap_page_attrs+0x55/0x220 ? bpf_prog_4d7e87c0d30db711_xdp_dispatcher+0x64/0x9f bnxt_rx_xdp+0x237/0x520 [bnxt_en] bnxt_rx_pkt+0x640/0xdd0 [bnxt_en] __bnxt_poll_work+0x1a1/0x3d0 [bnxt_en] bnxt_poll+0xaa/0x1e0 [bnxt_en] __napi_poll+0x33/0x1e0 net_rx_action+0x18a/0x2f0

AI-Powered Analysis

AILast updated: 06/28/2025, 23:25:42 UTC

Technical Analysis

CVE-2024-44984 is a vulnerability identified in the Linux kernel specifically related to the Broadcom NetXtreme-E (bnxt_en) network driver. The issue arises from a double DMA (Direct Memory Access) unmapping in the driver's XDP_REDIRECT code path. The vulnerability is caused by an erroneous call to dma_unmap_page_attrs() that should have been removed when the page pool mechanism was introduced to handle DMA mapping. This bug leads to a kernel warning and potential instability, as indicated by the warning message logged in the kernel's iommu_dma_unmap_page function. The problem manifests as a double unmapping of DMA pages, which can cause memory corruption or kernel crashes due to improper handling of DMA buffers. The vulnerability is rooted in the interaction between the network driver and the IOMMU (Input-Output Memory Management Unit) subsystem, which manages DMA address translations and protections. The bnxt_en driver is used for Broadcom NetXtreme-E network adapters, common in server environments. The vulnerability does not appear to have a known exploit in the wild yet, and no CVSS score has been assigned. The issue was resolved by removing the redundant dma_unmap_page_attrs() call in the XDP_REDIRECT code path, preventing the double unmapping and associated kernel warnings or crashes. This fix improves the stability and reliability of the network driver under high-performance packet processing scenarios using XDP (eXpress Data Path).

Potential Impact

For European organizations, especially those operating data centers, cloud infrastructure, or enterprise servers running Linux with Broadcom NetXtreme-E network adapters, this vulnerability could lead to system instability or denial of service through kernel crashes. The double DMA unmapping can corrupt memory management related to network packet processing, potentially causing kernel panics or degraded network performance. While there is no indication of direct exploitation for privilege escalation or remote code execution, the instability can disrupt critical services, impacting availability. Organizations relying on high-throughput networking with XDP for packet processing or load balancing may experience increased risk. This is particularly relevant for cloud service providers, telecom operators, and financial institutions in Europe that use Linux servers with affected network hardware. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to maintain system reliability and prevent potential future exploitation.

Mitigation Recommendations

1. Apply the official Linux kernel patches that remove the redundant dma_unmap_page_attrs() call in the bnxt_en driver's XDP_REDIRECT path. Ensure kernel versions are updated to those including this fix. 2. For organizations unable to immediately patch, consider disabling XDP_REDIRECT functionality on affected network interfaces as a temporary workaround to avoid triggering the double unmapping. 3. Monitor kernel logs for warnings related to iommu_dma_unmap_page and bnxt_en to detect any signs of the issue. 4. Validate that server hardware uses Broadcom NetXtreme-E adapters and assess exposure accordingly. 5. Coordinate with hardware vendors and Linux distribution maintainers to receive timely updates and security advisories. 6. Implement robust kernel crash recovery and high availability configurations to minimize service disruption in case of instability. 7. Conduct thorough testing of network driver updates in staging environments before production deployment to ensure compatibility and stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-21T05:34:56.670Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0dd6

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/28/2025, 11:25:42 PM

Last updated: 8/17/2025, 9:00:05 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats