Skip to main content

CVE-2024-50166: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50166cvecve-2024-50166
Published: Thu Nov 07 2024 (11/07/2024, 09:31:42 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: fsl/fman: Fix refcount handling of fman-related devices In mac_probe() there are multiple calls to of_find_device_by_node(), fman_bind() and fman_port_bind() which takes references to of_dev->dev. Not all references taken by these calls are released later on error path in mac_probe() and in mac_remove() which lead to reference leaks. Add references release.

AI-Powered Analysis

AILast updated: 06/28/2025, 17:57:41 UTC

Technical Analysis

CVE-2024-50166 is a vulnerability identified in the Linux kernel, specifically within the Freescale Frame Manager (fsl/fman) subsystem. The issue arises in the mac_probe() function, which is responsible for initializing network-related devices. Within this function, multiple calls are made to of_find_device_by_node(), fman_bind(), and fman_port_bind(), each of which increments reference counts on device structures (of_dev->dev). However, the vulnerability stems from improper reference count management: not all references acquired during these calls are properly released along error paths in mac_probe() and during device removal in mac_remove(). This leads to reference leaks, where the reference count on device objects is artificially inflated and not decremented as expected. Over time, such leaks can cause resource exhaustion, including memory leaks and potential denial of service (DoS) conditions due to the kernel holding onto device references longer than necessary. While this vulnerability does not appear to allow direct code execution or privilege escalation, the improper resource management can degrade system stability and reliability, especially on systems heavily utilizing the affected fman-related devices. The vulnerability was reserved on October 21, 2024, and published on November 7, 2024. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The fix involves adding proper reference release calls to ensure all acquired references are correctly decremented on error paths and device removal, preventing leaks.

Potential Impact

For European organizations, the impact of CVE-2024-50166 primarily concerns systems running Linux kernels that include the affected fsl/fman subsystem, which is typically found in embedded or specialized networking hardware using Freescale/NXP processors. Organizations operating critical infrastructure, telecommunications, or industrial control systems that rely on such hardware could experience degraded system performance or stability due to resource leaks. Over time, this could lead to system crashes or forced reboots, impacting availability of services. While the vulnerability does not directly compromise confidentiality or integrity, the resulting denial of service or instability could disrupt business operations, especially in sectors requiring high availability such as finance, healthcare, and public services. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental outages. European organizations with extensive Linux deployments in networking or embedded environments should prioritize patching to maintain operational continuity.

Mitigation Recommendations

1. Apply the official Linux kernel patch that addresses CVE-2024-50166 as soon as it becomes available from trusted sources or Linux distribution vendors. 2. Identify all systems using affected kernel versions with the fsl/fman subsystem, focusing on embedded devices, network appliances, and specialized hardware running Linux. 3. Implement monitoring for unusual resource usage patterns or kernel warnings related to device reference counts to detect potential leaks early. 4. Schedule regular kernel updates and maintenance windows for critical systems to minimize downtime during patching. 5. For systems where immediate patching is not feasible, consider isolating affected devices or limiting their exposure to reduce impact. 6. Engage with hardware vendors for firmware or driver updates that may also address related issues. 7. Maintain robust backup and recovery procedures to mitigate potential service disruptions caused by system instability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.962Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe016e

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 5:57:41 PM

Last updated: 8/15/2025, 7:04:48 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats