Skip to main content

CVE-2024-50171: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50171cvecve-2024-50171
Published: Thu Nov 07 2024 (11/07/2024, 09:31:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: systemport: fix potential memory leak in bcm_sysport_xmit() The bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb in case of dma_map_single() fails, add dev_kfree_skb() to fix it.

AI-Powered Analysis

AILast updated: 06/28/2025, 18:10:17 UTC

Technical Analysis

CVE-2024-50171 is a vulnerability identified in the Linux kernel, specifically within the bcm_sysport network driver component. The issue arises in the bcm_sysport_xmit() function, which is responsible for transmitting network packets. Under normal operation, this function handles the transmission of socket buffers (skb) and manages memory allocation and deallocation accordingly. However, the vulnerability occurs when the dma_map_single() call, which maps memory for Direct Memory Access (DMA), fails. In this failure scenario, bcm_sysport_xmit() incorrectly returns NETDEV_TX_OK without freeing the skb, leading to a potential memory leak. This means that memory allocated for network packets is not properly released, which over time can exhaust system memory resources. The fix involves adding a call to dev_kfree_skb() to ensure the skb is freed when dma_map_single() fails, preventing the leak. Although this vulnerability does not directly allow code execution or privilege escalation, the memory leak can degrade system performance and stability, especially on systems with high network traffic using the bcm_sysport driver. Since the vulnerability is in the Linux kernel, it affects all Linux distributions and devices using affected kernel versions that include this driver. The vulnerability was published on November 7, 2024, and as of now, there are no known exploits in the wild. The absence of a CVSS score suggests it is a lower-level issue primarily impacting availability through resource exhaustion rather than confidentiality or integrity.

Potential Impact

For European organizations, the impact of CVE-2024-50171 primarily concerns system availability and stability. Organizations relying on Linux-based infrastructure, particularly those using hardware with Broadcom Sysport network interfaces, may experience degraded network performance or system crashes if the memory leak accumulates over time. This can affect data centers, cloud service providers, telecommunications infrastructure, and enterprise networks that depend on stable Linux kernel operation. In critical environments such as financial institutions, healthcare, and government services, even intermittent downtime or degraded network throughput can disrupt operations and lead to financial and reputational damage. However, since exploitation requires triggering the specific failure condition in dma_map_single() and does not allow remote code execution or privilege escalation, the risk of direct compromise is low. The vulnerability is more likely to be exploited as part of a denial-of-service (DoS) scenario through resource exhaustion. European organizations with high network traffic and those running Linux kernels with the bcm_sysport driver should prioritize patching to maintain system reliability.

Mitigation Recommendations

To mitigate CVE-2024-50171, European organizations should: 1) Identify Linux systems running kernel versions that include the vulnerable bcm_sysport driver. This can be done by checking kernel version and driver presence using commands like 'lsmod' and reviewing kernel changelogs. 2) Apply the official Linux kernel patches that fix the bcm_sysport_xmit() function to ensure skb memory is freed properly on dma_map_single() failure. Since no patch links are provided, organizations should monitor official Linux kernel repositories and distribution security advisories for updates. 3) For systems where immediate patching is not feasible, implement monitoring for unusual memory consumption patterns related to network drivers and set alerts for abnormal resource usage to detect potential exploitation attempts. 4) Limit exposure by restricting access to network interfaces using bcm_sysport where possible, and ensure that network traffic is filtered and controlled to reduce the likelihood of triggering the failure condition. 5) Regularly update Linux kernels and maintain a robust patch management process to quickly address similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.963Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0182

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 6:10:17 PM

Last updated: 8/12/2025, 6:15:14 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats