CVE-2024-50113: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix invalid port index for parent device In a commit 24b7f8e5cd65 ("firewire: core: use helper functions for self ID sequence"), the enumeration over self ID sequence was refactored with some helper functions with KUnit tests. These helper functions are guaranteed to work expectedly by the KUnit tests, however their application includes a mistake to assign invalid value to the index of port connected to parent device. This bug affects the case that any extra node devices which has three or more ports are connected to 1394 OHCI controller. In the case, the path to update the tree cache could hits WARN_ON(), and gets general protection fault due to the access to invalid address computed by the invalid value. This commit fixes the bug to assign correct port index.
AI Analysis
Technical Summary
CVE-2024-50113 is a vulnerability identified in the Linux kernel's FireWire (IEEE 1394) core subsystem. The issue stems from a coding error introduced during a refactoring commit (24b7f8e5cd65) that implemented helper functions for handling the self ID sequence enumeration of FireWire devices. These helper functions, although covered by KUnit tests, incorrectly assign an invalid port index value to the parent device when enumerating extra node devices with three or more ports connected to a 1394 OHCI controller. This incorrect port index leads to an invalid memory address calculation during the update of the FireWire device tree cache. When this invalid address is accessed, it triggers a WARN_ON() kernel warning and results in a general protection fault (GPF), causing a kernel crash or system instability. The vulnerability specifically affects configurations where complex FireWire device topologies exist, involving nodes with multiple ports. The patch for this vulnerability corrects the port index assignment to ensure valid memory access and prevent the kernel fault. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-50113 is primarily related to system availability and stability. Systems running Linux kernels with affected FireWire support and connected to multi-port FireWire devices may experience kernel panics or crashes, leading to denial of service conditions. This can disrupt critical operations, especially in environments where FireWire is used for high-speed data transfer, such as multimedia production, scientific instrumentation, or industrial control systems. Although FireWire usage has declined in recent years, legacy systems and specialized equipment in sectors like broadcasting, research, and manufacturing may still rely on it. The vulnerability does not appear to allow privilege escalation or remote code execution directly, limiting confidentiality and integrity impacts. However, repeated crashes could lead to operational downtime and potential data loss if systems are not properly backed up or if the crashes occur during critical processing.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest stable version that includes the fix for CVE-2024-50113. Specifically, kernel maintainers and system administrators should verify that the patch correcting the port index assignment in the FireWire core is applied. For systems where FireWire devices with three or more ports are connected, consider temporarily disabling FireWire support if kernel updates cannot be immediately applied, to prevent exploitation of the vulnerability. Additionally, organizations should audit their hardware inventory to identify the presence of FireWire devices and assess their necessity. Implementing kernel crash monitoring and alerting can help detect and respond to potential exploitation attempts or system instability caused by this vulnerability. For environments with legacy or specialized equipment relying on FireWire, coordinate with vendors to ensure firmware and driver compatibility with patched kernels. Finally, maintain regular backups and disaster recovery plans to mitigate the impact of potential system crashes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2024-50113: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix invalid port index for parent device In a commit 24b7f8e5cd65 ("firewire: core: use helper functions for self ID sequence"), the enumeration over self ID sequence was refactored with some helper functions with KUnit tests. These helper functions are guaranteed to work expectedly by the KUnit tests, however their application includes a mistake to assign invalid value to the index of port connected to parent device. This bug affects the case that any extra node devices which has three or more ports are connected to 1394 OHCI controller. In the case, the path to update the tree cache could hits WARN_ON(), and gets general protection fault due to the access to invalid address computed by the invalid value. This commit fixes the bug to assign correct port index.
AI-Powered Analysis
Technical Analysis
CVE-2024-50113 is a vulnerability identified in the Linux kernel's FireWire (IEEE 1394) core subsystem. The issue stems from a coding error introduced during a refactoring commit (24b7f8e5cd65) that implemented helper functions for handling the self ID sequence enumeration of FireWire devices. These helper functions, although covered by KUnit tests, incorrectly assign an invalid port index value to the parent device when enumerating extra node devices with three or more ports connected to a 1394 OHCI controller. This incorrect port index leads to an invalid memory address calculation during the update of the FireWire device tree cache. When this invalid address is accessed, it triggers a WARN_ON() kernel warning and results in a general protection fault (GPF), causing a kernel crash or system instability. The vulnerability specifically affects configurations where complex FireWire device topologies exist, involving nodes with multiple ports. The patch for this vulnerability corrects the port index assignment to ensure valid memory access and prevent the kernel fault. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-50113 is primarily related to system availability and stability. Systems running Linux kernels with affected FireWire support and connected to multi-port FireWire devices may experience kernel panics or crashes, leading to denial of service conditions. This can disrupt critical operations, especially in environments where FireWire is used for high-speed data transfer, such as multimedia production, scientific instrumentation, or industrial control systems. Although FireWire usage has declined in recent years, legacy systems and specialized equipment in sectors like broadcasting, research, and manufacturing may still rely on it. The vulnerability does not appear to allow privilege escalation or remote code execution directly, limiting confidentiality and integrity impacts. However, repeated crashes could lead to operational downtime and potential data loss if systems are not properly backed up or if the crashes occur during critical processing.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest stable version that includes the fix for CVE-2024-50113. Specifically, kernel maintainers and system administrators should verify that the patch correcting the port index assignment in the FireWire core is applied. For systems where FireWire devices with three or more ports are connected, consider temporarily disabling FireWire support if kernel updates cannot be immediately applied, to prevent exploitation of the vulnerability. Additionally, organizations should audit their hardware inventory to identify the presence of FireWire devices and assess their necessity. Implementing kernel crash monitoring and alerting can help detect and respond to potential exploitation attempts or system instability caused by this vulnerability. For environments with legacy or specialized equipment relying on FireWire, coordinate with vendors to ensure firmware and driver compatibility with patched kernels. Finally, maintain regular backups and disaster recovery plans to mitigate the impact of potential system crashes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.947Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbdffa7
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 5:25:49 PM
Last updated: 12/3/2025, 6:52:28 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66478
LowCVE-2025-64763: CWE-693: Protection Mechanism Failure in envoyproxy envoy
LowCVE-2025-64527: CWE-476: NULL Pointer Dereference in envoyproxy envoy
MediumCVE-2025-66208: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in CollaboraOnline online
HighCVE-2025-66032: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in anthropics claude-code
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.