Skip to main content

CVE-2024-50001: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50001cvecve-2024-50001
Published: Mon Oct 21 2024 (10/21/2024, 18:02:40 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix error path in multi-packet WQE transmit Remove the erroneous unmap in case no DMA mapping was established The multi-packet WQE transmit code attempts to obtain a DMA mapping for the skb. This could fail, e.g. under memory pressure, when the IOMMU driver just can't allocate more memory for page tables. While the code tries to handle this in the path below the err_unmap label it erroneously unmaps one entry from the sq's FIFO list of active mappings. Since the current map attempt failed this unmap is removing some random DMA mapping that might still be required. If the PCI function now presents that IOVA, the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI function in error state. The erroneous behavior was seen in a stress-test environment that created memory pressure.

AI-Powered Analysis

AILast updated: 06/28/2025, 16:10:04 UTC

Technical Analysis

CVE-2024-50001 is a vulnerability identified in the Linux kernel's network driver code, specifically within the Mellanox mlx5 driver responsible for multi-packet Work Queue Element (WQE) transmit operations. The issue arises in the error handling path when attempting to obtain a Direct Memory Access (DMA) mapping for a socket buffer (skb). Under conditions such as memory pressure, the Input-Output Memory Management Unit (IOMMU) driver may fail to allocate memory for page tables, causing the DMA mapping attempt to fail. The flawed code erroneously performs an unmap operation on a DMA mapping entry even though no successful mapping was established. This unmap removes an active DMA mapping from the send queue's FIFO list, potentially invalidating a mapping still in use. If the PCI function subsequently presents the invalid I/O Virtual Address (IOVA), the IOMMU may detect this as a rogue DMA access. On certain architectures like IBM s390, this can cause the PCI function to enter an error state, disrupting device operations. The vulnerability was observed during stress testing under memory pressure conditions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The root cause is a logic error in error path cleanup, leading to potential stability and availability issues in affected Linux systems using the mlx5 driver with IOMMU enabled, especially under heavy load or constrained memory scenarios.

Potential Impact

For European organizations, this vulnerability primarily threatens the stability and availability of Linux systems running the mlx5 network driver, commonly used with Mellanox network interface cards (NICs). Mellanox hardware is widely deployed in data centers, cloud infrastructure, and high-performance computing environments across Europe. Affected systems under memory pressure may experience PCI device errors, leading to network interface failures or degraded performance. This can disrupt critical services relying on high-speed networking, such as financial transaction platforms, telecommunications infrastructure, and cloud service providers. While the vulnerability does not directly expose confidentiality or integrity risks, the resulting denial of service or hardware error states can cause operational downtime and impact business continuity. Organizations with large-scale Linux deployments using Mellanox NICs and IOMMU configurations are at higher risk, especially those running workloads that induce memory pressure or heavy network traffic. The lack of known exploits suggests limited immediate threat, but the potential for system instability warrants prompt attention to avoid service interruptions.

Mitigation Recommendations

To mitigate this vulnerability, organizations should prioritize applying the official Linux kernel patches that correct the erroneous unmap operation in the mlx5 driver's multi-packet WQE transmit code. Until patches are applied, administrators can reduce risk by monitoring system memory usage to avoid conditions of memory pressure that trigger the faulty error path. Disabling IOMMU or configuring it to less aggressive memory allocation policies may reduce the likelihood of DMA mapping failures, though this may impact system security or performance and should be evaluated carefully. Network administrators should also monitor PCI device error states and network interface health to detect early signs of this issue. For critical environments, consider deploying redundancy and failover mechanisms for affected network interfaces to maintain availability during potential device errors. Regularly updating Linux kernel versions and vendor drivers as part of patch management processes will help prevent exploitation of this and similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.058Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfc4d

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 4:10:04 PM

Last updated: 7/29/2025, 3:07:51 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats