Skip to main content

CVE-2024-50157: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50157cvecve-2024-50157
Published: Thu Nov 07 2024 (11/07/2024, 09:31:34 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop Driver waits indefinitely for the fifo occupancy to go below a threshold as soon as the pacing interrupt is received. This can cause soft lockup on one of the processors, if the rate of DB is very high. Add a loop count for FPGA and exit the __wait_for_fifo_occupancy_below_th if the loop is taking more time. Pacing will be continuing until the occupancy is below the threshold. This is ensured by the checks in bnxt_re_pacing_timer_exp and further scheduling the work for pacing based on the fifo occupancy.

AI-Powered Analysis

AILast updated: 06/28/2025, 17:56:06 UTC

Technical Analysis

CVE-2024-50157 is a vulnerability identified in the Linux kernel specifically related to the RDMA (Remote Direct Memory Access) bnxt_re driver, which is used for Broadcom NetXtreme-E network adapters. The issue arises from the driver's handling of FIFO (First In, First Out) occupancy checks during pacing interrupts. The driver waits indefinitely for the FIFO occupancy to drop below a certain threshold after a pacing interrupt is received. If the rate of doorbell (DB) events is very high, this indefinite wait can cause a soft lockup on one of the processors, effectively freezing that CPU core and potentially degrading system performance or responsiveness. The root cause is a loop that checks FIFO occupancy without a proper exit condition, leading to the CPU being stuck in this loop. The fix implemented adds a loop count limit for FPGA (Field Programmable Gate Array) and exits the wait loop if it takes too long, while ensuring pacing continues correctly based on FIFO occupancy. This prevents the CPU from locking up indefinitely while maintaining proper pacing behavior. This vulnerability affects Linux kernel versions containing the specified commit hashes and is relevant to systems using the bnxt_re driver for RDMA operations. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-50157 depends largely on their use of Linux systems with Broadcom NetXtreme-E network adapters in environments leveraging RDMA for high-performance networking, such as data centers, HPC clusters, or financial trading platforms. A soft lockup on a CPU core can lead to degraded system performance, increased latency, or temporary unavailability of critical network functions. This can disrupt business operations, especially in latency-sensitive applications. While this vulnerability does not directly lead to remote code execution or data leakage, the denial-of-service-like effect on CPU availability can impact service reliability and uptime. Organizations with heavy RDMA workloads or those relying on Linux-based network infrastructure should be particularly cautious. The absence of known exploits reduces immediate risk, but the potential for future exploitation or accidental system instability remains.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Apply the latest Linux kernel patches that address CVE-2024-50157 as soon as they become available, ensuring the bnxt_re driver includes the loop count fix to prevent CPU lockups. 2) Monitor systems using Broadcom NetXtreme-E adapters for signs of CPU soft lockups or unusual latency spikes, especially under high RDMA traffic conditions. 3) Implement proactive system health monitoring and alerting to detect and respond to CPU stalls or performance degradation promptly. 4) Where feasible, consider temporarily limiting RDMA doorbell event rates or pacing parameters to reduce the likelihood of triggering the issue until patches are applied. 5) Engage with hardware and Linux distribution vendors to confirm patch availability and compatibility with existing infrastructure. 6) Test patches in staging environments to ensure stability before production deployment, given the critical nature of network drivers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.960Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0117

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 5:56:06 PM

Last updated: 8/12/2025, 10:39:22 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats