Skip to main content

CVE-2024-50172: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50172cvecve-2024-50172
Published: Thu Nov 07 2024 (11/07/2024, 09:31:48 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix a possible memory leak In bnxt_re_setup_chip_ctx() when bnxt_qplib_map_db_bar() fails driver is not freeing the memory allocated for "rdev->chip_ctx".

AI-Powered Analysis

AILast updated: 06/28/2025, 18:10:27 UTC

Technical Analysis

CVE-2024-50172 is a vulnerability identified in the Linux kernel specifically affecting the RDMA (Remote Direct Memory Access) driver component for Broadcom NetXtreme (bnxt_re). The issue arises in the function bnxt_re_setup_chip_ctx(), where if the call to bnxt_qplib_map_db_bar() fails, the driver neglects to free the memory allocated for the chip context structure (rdev->chip_ctx). This results in a potential memory leak. Although the vulnerability does not directly lead to code execution or privilege escalation, the memory leak could degrade system performance or stability over time, especially in environments heavily utilizing RDMA for high-performance networking. The vulnerability is present in certain Linux kernel versions identified by the commit hash 0ac20faf5d837b59fb4c041ea320932ed47fd67f. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was reserved on 2024-10-21 and published on 2024-11-07. The problem is rooted in resource management within a low-level driver, which is critical for systems relying on RDMA for fast data transfer, such as data centers and high-performance computing clusters.

Potential Impact

For European organizations, the impact of CVE-2024-50172 is primarily related to system reliability and resource management. Organizations utilizing Linux servers with RDMA-enabled Broadcom NetXtreme network adapters—common in data centers, cloud providers, and HPC environments—may experience gradual memory exhaustion leading to degraded performance or potential system crashes if the memory leak accumulates over time. This can affect availability of critical services, particularly in sectors like finance, telecommunications, research institutions, and cloud infrastructure providers that rely on high-throughput, low-latency networking. While the vulnerability does not appear to compromise confidentiality or integrity directly, the availability impact could disrupt business operations and service level agreements. Since no active exploits are known, the immediate risk is low, but unpatched systems could become targets if attackers develop exploitation techniques that leverage the memory leak to cause denial of service or other indirect impacts.

Mitigation Recommendations

To mitigate CVE-2024-50172, European organizations should prioritize updating their Linux kernel to the patched versions that address the memory leak in the bnxt_re driver. Specifically, kernel updates containing the fix for the bnxt_re_setup_chip_ctx() function should be applied promptly. Organizations should audit their infrastructure to identify systems using Broadcom NetXtreme RDMA adapters and verify kernel versions. Monitoring tools should be configured to track memory usage trends on affected systems to detect abnormal memory consumption that could indicate the leak in operation. Additionally, implementing kernel live patching where feasible can reduce downtime during updates. For environments where immediate patching is not possible, temporarily disabling RDMA functionality on affected interfaces may reduce exposure. Network and system administrators should also review logs and system metrics for signs of instability or resource exhaustion. Finally, maintaining an up-to-date inventory of hardware and software assets will facilitate rapid response to similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.963Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0186

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 6:10:27 PM

Last updated: 7/26/2025, 11:58:47 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats