Skip to main content

CVE-2024-50113: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50113cvecve-2024-50113
Published: Tue Nov 05 2024 (11/05/2024, 17:10:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix invalid port index for parent device In a commit 24b7f8e5cd65 ("firewire: core: use helper functions for self ID sequence"), the enumeration over self ID sequence was refactored with some helper functions with KUnit tests. These helper functions are guaranteed to work expectedly by the KUnit tests, however their application includes a mistake to assign invalid value to the index of port connected to parent device. This bug affects the case that any extra node devices which has three or more ports are connected to 1394 OHCI controller. In the case, the path to update the tree cache could hits WARN_ON(), and gets general protection fault due to the access to invalid address computed by the invalid value. This commit fixes the bug to assign correct port index.

AI-Powered Analysis

AILast updated: 06/28/2025, 17:25:49 UTC

Technical Analysis

CVE-2024-50113 is a vulnerability identified in the Linux kernel's FireWire (IEEE 1394) core subsystem. The issue stems from a coding error introduced during a refactoring commit (24b7f8e5cd65) that implemented helper functions for handling the self ID sequence enumeration of FireWire devices. These helper functions, although covered by KUnit tests, incorrectly assign an invalid port index value to the parent device when enumerating extra node devices with three or more ports connected to a 1394 OHCI controller. This incorrect port index leads to an invalid memory address calculation during the update of the FireWire device tree cache. When this invalid address is accessed, it triggers a WARN_ON() kernel warning and results in a general protection fault (GPF), causing a kernel crash or system instability. The vulnerability specifically affects configurations where complex FireWire device topologies exist, involving nodes with multiple ports. The patch for this vulnerability corrects the port index assignment to ensure valid memory access and prevent the kernel fault. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-50113 is primarily related to system availability and stability. Systems running Linux kernels with affected FireWire support and connected to multi-port FireWire devices may experience kernel panics or crashes, leading to denial of service conditions. This can disrupt critical operations, especially in environments where FireWire is used for high-speed data transfer, such as multimedia production, scientific instrumentation, or industrial control systems. Although FireWire usage has declined in recent years, legacy systems and specialized equipment in sectors like broadcasting, research, and manufacturing may still rely on it. The vulnerability does not appear to allow privilege escalation or remote code execution directly, limiting confidentiality and integrity impacts. However, repeated crashes could lead to operational downtime and potential data loss if systems are not properly backed up or if the crashes occur during critical processing.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest stable version that includes the fix for CVE-2024-50113. Specifically, kernel maintainers and system administrators should verify that the patch correcting the port index assignment in the FireWire core is applied. For systems where FireWire devices with three or more ports are connected, consider temporarily disabling FireWire support if kernel updates cannot be immediately applied, to prevent exploitation of the vulnerability. Additionally, organizations should audit their hardware inventory to identify the presence of FireWire devices and assess their necessity. Implementing kernel crash monitoring and alerting can help detect and respond to potential exploitation attempts or system instability caused by this vulnerability. For environments with legacy or specialized equipment relying on FireWire, coordinate with vendors to ensure firmware and driver compatibility with patched kernels. Finally, maintain regular backups and disaster recovery plans to mitigate the impact of potential system crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.947Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbdffa7

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 5:25:49 PM

Last updated: 7/26/2025, 12:26:13 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats