CVE-2024-50097: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: fec: don't save PTP state if PTP is unsupported Some platforms (such as i.MX25 and i.MX27) do not support PTP, so on these platforms fec_ptp_init() is not called and the related members in fep are not initialized. However, fec_ptp_save_state() is called unconditionally, which causes the kernel to panic. Therefore, add a condition so that fec_ptp_save_state() is not called if PTP is not supported.
AI Analysis
Technical Summary
CVE-2024-50097 is a vulnerability identified in the Linux kernel's handling of the Fast Ethernet Controller (FEC) driver, specifically related to the Precision Time Protocol (PTP) state management. The issue arises on certain platforms, such as the i.MX25 and i.MX27, which do not support PTP. In these cases, the fec_ptp_init() function is not invoked, leaving related data structures uninitialized. However, the kernel still calls fec_ptp_save_state() unconditionally, which attempts to save the PTP state despite its absence. This results in a kernel panic, causing the system to crash. The root cause is a missing conditional check before calling fec_ptp_save_state(), which should only be executed if PTP support is present. The vulnerability leads to a denial-of-service (DoS) condition by crashing the kernel on affected systems. The fix involves adding a condition to prevent fec_ptp_save_state() from being called when PTP is unsupported. This vulnerability affects specific Linux kernel versions identified by certain commit hashes and was published on November 5, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-50097 is a potential denial-of-service condition on Linux systems running on affected hardware platforms, particularly those using i.MX25 and i.MX27 processors or similar architectures that lack PTP support. This could disrupt critical infrastructure or embedded systems that rely on these platforms, such as industrial control systems, telecommunications equipment, or IoT devices. The kernel panic caused by this vulnerability could lead to system downtime, loss of availability, and potential operational disruptions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could be significant in environments where uptime is critical. European organizations using embedded Linux systems in manufacturing, transportation, or telecommunications sectors should be particularly vigilant. Since no exploits are currently known, the risk of active attacks is low but could increase if attackers develop exploits targeting this flaw.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify Linux systems running on affected platforms (e.g., i.MX25, i.MX27) or similar hardware lacking PTP support. 2) Apply the latest Linux kernel patches or updates that include the fix for CVE-2024-50097 as soon as they become available. 3) For embedded or specialized devices where kernel updates are not straightforward, coordinate with device vendors or maintainers to obtain patched firmware or kernel versions. 4) Implement monitoring to detect kernel panics or unexpected reboots that could indicate exploitation attempts or triggering of this vulnerability. 5) In environments where patching is delayed, consider isolating affected devices from critical networks to reduce impact. 6) Review system logs and incident response plans to prepare for potential denial-of-service incidents related to this vulnerability. 7) Engage with hardware and software suppliers to ensure ongoing support and timely patching for embedded Linux systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Finland
CVE-2024-50097: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: fec: don't save PTP state if PTP is unsupported Some platforms (such as i.MX25 and i.MX27) do not support PTP, so on these platforms fec_ptp_init() is not called and the related members in fep are not initialized. However, fec_ptp_save_state() is called unconditionally, which causes the kernel to panic. Therefore, add a condition so that fec_ptp_save_state() is not called if PTP is not supported.
AI-Powered Analysis
Technical Analysis
CVE-2024-50097 is a vulnerability identified in the Linux kernel's handling of the Fast Ethernet Controller (FEC) driver, specifically related to the Precision Time Protocol (PTP) state management. The issue arises on certain platforms, such as the i.MX25 and i.MX27, which do not support PTP. In these cases, the fec_ptp_init() function is not invoked, leaving related data structures uninitialized. However, the kernel still calls fec_ptp_save_state() unconditionally, which attempts to save the PTP state despite its absence. This results in a kernel panic, causing the system to crash. The root cause is a missing conditional check before calling fec_ptp_save_state(), which should only be executed if PTP support is present. The vulnerability leads to a denial-of-service (DoS) condition by crashing the kernel on affected systems. The fix involves adding a condition to prevent fec_ptp_save_state() from being called when PTP is unsupported. This vulnerability affects specific Linux kernel versions identified by certain commit hashes and was published on November 5, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-50097 is a potential denial-of-service condition on Linux systems running on affected hardware platforms, particularly those using i.MX25 and i.MX27 processors or similar architectures that lack PTP support. This could disrupt critical infrastructure or embedded systems that rely on these platforms, such as industrial control systems, telecommunications equipment, or IoT devices. The kernel panic caused by this vulnerability could lead to system downtime, loss of availability, and potential operational disruptions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could be significant in environments where uptime is critical. European organizations using embedded Linux systems in manufacturing, transportation, or telecommunications sectors should be particularly vigilant. Since no exploits are currently known, the risk of active attacks is low but could increase if attackers develop exploits targeting this flaw.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify Linux systems running on affected platforms (e.g., i.MX25, i.MX27) or similar hardware lacking PTP support. 2) Apply the latest Linux kernel patches or updates that include the fix for CVE-2024-50097 as soon as they become available. 3) For embedded or specialized devices where kernel updates are not straightforward, coordinate with device vendors or maintainers to obtain patched firmware or kernel versions. 4) Implement monitoring to detect kernel panics or unexpected reboots that could indicate exploitation attempts or triggering of this vulnerability. 5) In environments where patching is delayed, consider isolating affected devices from critical networks to reduce impact. 6) Review system logs and incident response plans to prepare for potential denial-of-service incidents related to this vulnerability. 7) Engage with hardware and software suppliers to ensure ongoing support and timely patching for embedded Linux systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.945Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdcf37
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/27/2025, 9:55:50 PM
Last updated: 8/7/2025, 10:17:54 AM
Views: 13
Related Threats
CVE-2025-8831: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8829: OS Command Injection in Linksys RE6250
MediumCVE-2025-8828: OS Command Injection in Linksys RE6250
MediumCVE-2025-8827: OS Command Injection in Linksys RE6250
MediumCVE-2025-8826: Stack-based Buffer Overflow in Linksys RE6250
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.