Skip to main content

CVE-2024-50094: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50094cvecve-2024-50094
Published: Tue Nov 05 2024 (11/05/2024, 17:04:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: sfc: Don't invoke xdp_do_flush() from netpoll. Yury reported a crash in the sfc driver originated from netpoll_send_udp(). The netconsole sends a message and then netpoll invokes the driver's NAPI function with a budget of zero. It is dedicated to allow driver to free TX resources, that it may have used while sending the packet. In the netpoll case the driver invokes xdp_do_flush() unconditionally, leading to crash because bpf_net_context was never assigned. Invoke xdp_do_flush() only if budget is not zero.

AI-Powered Analysis

AILast updated: 06/28/2025, 17:10:44 UTC

Technical Analysis

CVE-2024-50094 is a vulnerability identified in the Linux kernel's sfc network driver, specifically related to the netpoll functionality. Netpoll is a kernel feature used for sending network packets in low-level debugging and logging scenarios, such as netconsole. The issue arises when netpoll_send_udp() sends a message and then invokes the driver's NAPI (New API) function with a budget of zero. This zero budget is intended to allow the driver to free transmit (TX) resources used during packet sending. However, in this vulnerability, the sfc driver unconditionally calls the function xdp_do_flush() regardless of the budget value. The function xdp_do_flush() expects a valid bpf_net_context structure, which is not assigned in the netpoll case. This leads to a kernel crash due to dereferencing an uninitialized or null pointer. The root cause is the unconditional invocation of xdp_do_flush() without checking if the budget is non-zero. The fix involves modifying the driver to call xdp_do_flush() only when the budget is greater than zero, preventing the crash. This vulnerability is a denial-of-service (DoS) type, causing a kernel panic or crash when triggered. It does not appear to allow privilege escalation or code execution. No known exploits are currently reported in the wild. The affected Linux kernel versions include the specific commit 401cb7dae8130fd34eb84648e02ab4c506df7d5e, indicating a narrow window of vulnerability in recent kernel builds. The vulnerability was publicly disclosed on November 5, 2024, with no CVSS score assigned yet.

Potential Impact

For European organizations relying on Linux-based systems, especially those using the sfc network driver (commonly associated with Solarflare network cards), this vulnerability can lead to unexpected kernel crashes and system downtime. This can disrupt critical services, particularly in data centers, cloud infrastructure, and telecommunications environments where high availability is essential. Systems used for network monitoring, debugging, or logging that utilize netpoll may be particularly susceptible. Although the vulnerability does not directly lead to data breaches or privilege escalation, the denial-of-service impact can affect service continuity, potentially causing operational disruptions and financial losses. Organizations with strict uptime requirements or those operating critical infrastructure may face increased risk. Additionally, the need to patch kernel versions promptly may require coordinated maintenance windows, impacting operational schedules.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue is tied to a specific commit, applying the latest stable kernel updates from trusted Linux distributions that include the fix is essential. For environments using Solarflare network cards or the sfc driver, verify the driver version and kernel compatibility. Disable netpoll functionality if it is not required, as this reduces the attack surface. Implement robust monitoring to detect kernel crashes or unusual system reboots that may indicate exploitation attempts. In virtualized or containerized environments, ensure that host kernels are patched to prevent guest VM or container disruptions. Coordinate patch management with minimal service disruption, and test updates in staging environments before production deployment. Maintain backups and recovery plans to mitigate potential downtime caused by crashes. Finally, keep abreast of vendor advisories and Linux kernel mailing lists for any emerging exploit information or additional patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.943Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfef7

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 5:10:44 PM

Last updated: 8/17/2025, 10:39:57 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats