CVE-2024-50158: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix out of bound check Driver exports pacing stats only on GenP5 and P7 adapters. But while parsing the pacing stats, driver has a check for "rdev->dbr_pacing". This caused a trace when KASAN is enabled. BUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats+0x2b6a/0x2e00 [bnxt_re] Write of size 8 at addr ffff8885942a6340 by task modprobe/4809
AI Analysis
Technical Summary
CVE-2024-50158 is a vulnerability identified in the Linux kernel, specifically within the RDMA (Remote Direct Memory Access) bnxt_re driver, which is used for Broadcom NetXtreme-E network adapters. The issue arises from an out-of-bounds memory access during the parsing of pacing statistics. The driver exports pacing stats only on GenP5 and P7 adapters, but the code incorrectly checks for the presence of "rdev->dbr_pacing" while parsing these stats. This leads to a slab-out-of-bounds write detected by the Kernel Address Sanitizer (KASAN) when enabled, causing a kernel bug (BUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats). The vulnerability manifests as an 8-byte write at an invalid memory address during execution of the modprobe task, which could potentially lead to memory corruption within the kernel space. Although no known exploits are reported in the wild, the vulnerability could be leveraged to cause denial of service (kernel crash) or potentially escalate privileges if exploited. The affected Linux kernel versions are identified by specific commit hashes, indicating that the issue is present in certain recent kernel builds prior to the patch. The vulnerability was reserved on October 21, 2024, and published on November 7, 2024, but no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the vulnerable bnxt_re driver enabled, particularly those using Broadcom NetXtreme-E GenP5 and P7 network adapters. Such systems are common in enterprise data centers, cloud infrastructure, and high-performance computing environments. Exploitation could lead to kernel crashes causing denial of service, impacting availability of critical services. In worst-case scenarios, memory corruption could be leveraged for privilege escalation, threatening confidentiality and integrity of sensitive data. This is especially critical for sectors like finance, healthcare, telecommunications, and government agencies in Europe that rely heavily on Linux-based infrastructure. The lack of known exploits reduces immediate risk, but the presence of a kernel-level memory corruption bug warrants prompt attention to prevent potential targeted attacks. Additionally, the use of KASAN to detect the bug indicates it may be exploitable under certain conditions, increasing the threat to organizations with high-security requirements.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability is tied to specific hardware drivers (bnxt_re for Broadcom NetXtreme-E GenP5 and P7 adapters), organizations should audit their hardware inventory to identify affected network adapters. Disabling or unloading the bnxt_re driver temporarily can mitigate risk if patching is delayed, though this may impact network functionality. Enabling kernel hardening features such as KASAN in testing environments can help detect similar issues proactively. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable systems. Monitoring kernel logs for unusual crashes or KASAN alerts can provide early warning signs of exploitation attempts. Finally, vendors and Linux distributions should be engaged to ensure timely deployment of patches and security advisories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-50158: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix out of bound check Driver exports pacing stats only on GenP5 and P7 adapters. But while parsing the pacing stats, driver has a check for "rdev->dbr_pacing". This caused a trace when KASAN is enabled. BUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats+0x2b6a/0x2e00 [bnxt_re] Write of size 8 at addr ffff8885942a6340 by task modprobe/4809
AI-Powered Analysis
Technical Analysis
CVE-2024-50158 is a vulnerability identified in the Linux kernel, specifically within the RDMA (Remote Direct Memory Access) bnxt_re driver, which is used for Broadcom NetXtreme-E network adapters. The issue arises from an out-of-bounds memory access during the parsing of pacing statistics. The driver exports pacing stats only on GenP5 and P7 adapters, but the code incorrectly checks for the presence of "rdev->dbr_pacing" while parsing these stats. This leads to a slab-out-of-bounds write detected by the Kernel Address Sanitizer (KASAN) when enabled, causing a kernel bug (BUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats). The vulnerability manifests as an 8-byte write at an invalid memory address during execution of the modprobe task, which could potentially lead to memory corruption within the kernel space. Although no known exploits are reported in the wild, the vulnerability could be leveraged to cause denial of service (kernel crash) or potentially escalate privileges if exploited. The affected Linux kernel versions are identified by specific commit hashes, indicating that the issue is present in certain recent kernel builds prior to the patch. The vulnerability was reserved on October 21, 2024, and published on November 7, 2024, but no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the vulnerable bnxt_re driver enabled, particularly those using Broadcom NetXtreme-E GenP5 and P7 network adapters. Such systems are common in enterprise data centers, cloud infrastructure, and high-performance computing environments. Exploitation could lead to kernel crashes causing denial of service, impacting availability of critical services. In worst-case scenarios, memory corruption could be leveraged for privilege escalation, threatening confidentiality and integrity of sensitive data. This is especially critical for sectors like finance, healthcare, telecommunications, and government agencies in Europe that rely heavily on Linux-based infrastructure. The lack of known exploits reduces immediate risk, but the presence of a kernel-level memory corruption bug warrants prompt attention to prevent potential targeted attacks. Additionally, the use of KASAN to detect the bug indicates it may be exploitable under certain conditions, increasing the threat to organizations with high-security requirements.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability is tied to specific hardware drivers (bnxt_re for Broadcom NetXtreme-E GenP5 and P7 adapters), organizations should audit their hardware inventory to identify affected network adapters. Disabling or unloading the bnxt_re driver temporarily can mitigate risk if patching is delayed, though this may impact network functionality. Enabling kernel hardening features such as KASAN in testing environments can help detect similar issues proactively. Network segmentation and strict access controls should be enforced to limit exposure of vulnerable systems. Monitoring kernel logs for unusual crashes or KASAN alerts can provide early warning signs of exploitation attempts. Finally, vendors and Linux distributions should be engaged to ensure timely deployment of patches and security advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.961Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe011b
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 5:56:17 PM
Last updated: 8/13/2025, 6:38:40 AM
Views: 16
Related Threats
CVE-2025-9341: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS
MediumCVE-2025-8678: CWE-918 Server-Side Request Forgery (SSRF) in johnbillion WP Crontrol
MediumCVE-2025-57699: Unquoted search path or element in Western Digital Corporation Western Digital Kitfox for Windows
MediumCVE-2025-8281: CWE-79 Cross-Site Scripting (XSS) in WP Talroo
HighCVE-2025-41452: CWE-15: External Control of System or Configuration Setting in Danfoss AK-SM8xxA Series
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.