Skip to main content

CVE-2024-50169: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50169cvecve-2024-50169
Published: Thu Nov 07 2024 (11/07/2024, 09:31:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: vsock: Update rx_bytes on read_skb() Make sure virtio_transport_inc_rx_pkt() and virtio_transport_dec_rx_pkt() calls are balanced (i.e. virtio_vsock_sock::rx_bytes doesn't lie) after vsock_transport::read_skb(). While here, also inform the peer that we've freed up space and it has more credit. Failing to update rx_bytes after packet is dequeued leads to a warning on SOCK_STREAM recv(): [ 233.396654] rx_queue is empty, but rx_bytes is non-zero [ 233.396702] WARNING: CPU: 11 PID: 40601 at net/vmw_vsock/virtio_transport_common.c:589

AI-Powered Analysis

AILast updated: 06/28/2025, 18:09:53 UTC

Technical Analysis

CVE-2024-50169 is a vulnerability identified in the Linux kernel specifically affecting the vsock (virtual socket) subsystem, which is used for communication between virtual machines and the host or between virtual machines themselves. The vulnerability arises from improper handling of the rx_bytes counter in the virtio_transport layer. The issue occurs because the calls to increment and decrement the received packet count (virtio_transport_inc_rx_pkt() and virtio_transport_dec_rx_pkt()) are not properly balanced after the vsock_transport::read_skb() function processes a packet. This imbalance causes the rx_bytes counter to become inaccurate, leading to a state where the receive queue is empty but rx_bytes is non-zero. This inconsistency triggers kernel warnings during SOCK_STREAM recv() operations, as evidenced by the logged warning message: "rx_queue is empty, but rx_bytes is non-zero." The root cause is the failure to update rx_bytes after dequeuing a packet, which also prevents the peer from being informed that buffer space has been freed and more credit is available. Although this vulnerability does not appear to have an associated CVSS score or known exploits in the wild at the time of publication, it can cause kernel warnings and potentially impact the stability and reliability of virtual socket communications in environments relying on virtio vsock transport. This could lead to degraded performance or unexpected behavior in virtualized environments that use Linux kernel versions containing the affected commit hashes. The fix involves ensuring that the increment and decrement calls for rx_bytes are balanced and that the peer is notified appropriately about buffer availability, thereby maintaining accurate accounting and preventing warnings or potential data handling issues.

Potential Impact

For European organizations, especially those utilizing Linux-based virtualization platforms such as KVM or QEMU that rely on virtio vsock for inter-VM or VM-to-host communication, this vulnerability could lead to kernel warnings and instability in virtual socket communication channels. While it does not directly lead to remote code execution or privilege escalation, the inaccurate accounting of received bytes may cause application-level disruptions or degraded performance in critical virtualized workloads. This could affect cloud service providers, financial institutions, research centers, and enterprises heavily dependent on virtualized infrastructure. The impact is primarily on availability and reliability of services running on Linux virtual machines, potentially causing service interruptions or increased troubleshooting overhead. Since the vulnerability affects the Linux kernel, any European organization running affected kernel versions in production or development environments is at risk of encountering these issues, which could complicate operations and incident response. Although no active exploitation is reported, the presence of kernel warnings may serve as an early indicator of underlying communication problems that could escalate if left unpatched.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the patched versions that address CVE-2024-50169 as soon as they become available from their Linux distribution vendors. Specifically, they should ensure that the kernel versions incorporate the fix balancing the virtio_transport_inc_rx_pkt() and virtio_transport_dec_rx_pkt() calls and properly notify peers about buffer availability. In environments where immediate patching is not feasible, administrators should monitor kernel logs for the specific warning message "rx_queue is empty, but rx_bytes is non-zero" to detect potential exploitation or manifestation of the issue. Virtualization administrators should also review the configuration and usage of virtio vsock devices to minimize unnecessary exposure and consider isolating critical workloads from affected kernel versions. Additionally, testing kernel updates in staging environments before deployment can prevent unexpected disruptions. Organizations should maintain robust backup and recovery procedures for virtual machines to mitigate any potential service interruptions. Finally, engaging with Linux distribution security advisories and subscribing to relevant vulnerability notifications will help ensure timely awareness and response to this and related vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.962Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe017a

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 6:09:53 PM

Last updated: 8/16/2025, 11:12:36 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats