Skip to main content

CVE-2024-50136: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50136cvecve-2024-50136
Published: Tue Nov 05 2024 (11/05/2024, 17:11:00 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Unregister notifier on eswitch init failure It otherwise remains registered and a subsequent attempt at eswitch enabling might trigger warnings of the sort: [ 682.589148] ------------[ cut here ]------------ [ 682.590204] notifier callback eswitch_vport_event [mlx5_core] already registered [ 682.590256] WARNING: CPU: 13 PID: 2660 at kernel/notifier.c:31 notifier_chain_register+0x3e/0x90 [...snipped] [ 682.610052] Call Trace: [ 682.610369] <TASK> [ 682.610663] ? __warn+0x7c/0x110 [ 682.611050] ? notifier_chain_register+0x3e/0x90 [ 682.611556] ? report_bug+0x148/0x170 [ 682.611977] ? handle_bug+0x36/0x70 [ 682.612384] ? exc_invalid_op+0x13/0x60 [ 682.612817] ? asm_exc_invalid_op+0x16/0x20 [ 682.613284] ? notifier_chain_register+0x3e/0x90 [ 682.613789] atomic_notifier_chain_register+0x25/0x40 [ 682.614322] mlx5_eswitch_enable_locked+0x1d4/0x3b0 [mlx5_core] [ 682.614965] mlx5_eswitch_enable+0xc9/0x100 [mlx5_core] [ 682.615551] mlx5_device_enable_sriov+0x25/0x340 [mlx5_core] [ 682.616170] mlx5_core_sriov_configure+0x50/0x170 [mlx5_core] [ 682.616789] sriov_numvfs_store+0xb0/0x1b0 [ 682.617248] kernfs_fop_write_iter+0x117/0x1a0 [ 682.617734] vfs_write+0x231/0x3f0 [ 682.618138] ksys_write+0x63/0xe0 [ 682.618536] do_syscall_64+0x4c/0x100 [ 682.618958] entry_SYSCALL_64_after_hwframe+0x4b/0x53

AI-Powered Analysis

AILast updated: 06/27/2025, 21:56:15 UTC

Technical Analysis

CVE-2024-50136 is a vulnerability identified in the Linux kernel, specifically within the Mellanox mlx5 driver component responsible for managing network devices. The issue arises from improper handling of notifier registration during the initialization of the eswitch (Ethernet switch) functionality. When an eswitch initialization fails, the notifier callback remains registered instead of being unregistered properly. This leads to multiple registrations of the same notifier callback upon subsequent attempts to enable the eswitch, triggering kernel warnings and potential instability. The kernel logs indicate repeated warnings such as "notifier callback eswitch_vport_event [mlx5_core] already registered" and a stack trace pointing to the notifier_chain_register function. Although the vulnerability does not appear to cause immediate crashes or remote code execution, the improper notifier management can result in kernel warnings, potential resource leaks, and could contribute to system instability or denial of service under certain conditions. The vulnerability affects multiple Linux kernel versions as indicated by the affected commit hashes, and it is resolved by ensuring the notifier is unregistered if eswitch initialization fails. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-50136 primarily concerns systems utilizing Mellanox network adapters with the mlx5 driver, which are common in data centers, cloud infrastructure, and high-performance computing environments. The vulnerability could lead to kernel warnings and instability, potentially causing service disruptions or degraded network performance. While it does not directly enable remote code execution or privilege escalation, the resulting instability could affect critical infrastructure relying on Linux servers, including financial institutions, telecommunications providers, and cloud service operators. Organizations with heavy reliance on virtualized environments using SR-IOV (Single Root I/O Virtualization) and eswitch features may experience more pronounced effects. Although no active exploits are known, the vulnerability could be leveraged in multi-stage attacks or combined with other vulnerabilities to cause denial of service or system crashes, impacting availability and operational continuity.

Mitigation Recommendations

To mitigate CVE-2024-50136, European organizations should: 1) Apply the latest Linux kernel updates that include the patch fixing the notifier unregistration issue in the mlx5 driver. 2) Conduct an inventory of systems using Mellanox network adapters and verify kernel versions to identify vulnerable hosts. 3) For critical production environments, schedule maintenance windows to update kernels and reboot affected systems to ensure the patch is applied. 4) Monitor kernel logs for repeated notifier registration warnings as an indicator of unpatched systems or attempted exploitation. 5) Implement robust system monitoring and alerting to detect unusual kernel warnings or instability that could signal exploitation attempts. 6) Engage with hardware vendors and Linux distribution maintainers to ensure timely receipt of patches and advisories. 7) Consider temporary workarounds such as disabling eswitch features if feasible, until patches can be applied, to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.955Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdcf45

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 9:56:15 PM

Last updated: 7/31/2025, 5:43:11 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats