CVE-2024-50172: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix a possible memory leak In bnxt_re_setup_chip_ctx() when bnxt_qplib_map_db_bar() fails driver is not freeing the memory allocated for "rdev->chip_ctx".
AI Analysis
Technical Summary
CVE-2024-50172 is a vulnerability identified in the Linux kernel specifically affecting the RDMA (Remote Direct Memory Access) driver component for Broadcom NetXtreme (bnxt_re). The issue arises in the function bnxt_re_setup_chip_ctx(), where if the call to bnxt_qplib_map_db_bar() fails, the driver neglects to free the memory allocated for the chip context structure (rdev->chip_ctx). This results in a potential memory leak. Although the vulnerability does not directly lead to code execution or privilege escalation, the memory leak could degrade system performance or stability over time, especially in environments heavily utilizing RDMA for high-performance networking. The vulnerability is present in certain Linux kernel versions identified by the commit hash 0ac20faf5d837b59fb4c041ea320932ed47fd67f. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was reserved on 2024-10-21 and published on 2024-11-07. The problem is rooted in resource management within a low-level driver, which is critical for systems relying on RDMA for fast data transfer, such as data centers and high-performance computing clusters.
Potential Impact
For European organizations, the impact of CVE-2024-50172 is primarily related to system reliability and resource management. Organizations utilizing Linux servers with RDMA-enabled Broadcom NetXtreme network adapters—common in data centers, cloud providers, and HPC environments—may experience gradual memory exhaustion leading to degraded performance or potential system crashes if the memory leak accumulates over time. This can affect availability of critical services, particularly in sectors like finance, telecommunications, research institutions, and cloud infrastructure providers that rely on high-throughput, low-latency networking. While the vulnerability does not appear to compromise confidentiality or integrity directly, the availability impact could disrupt business operations and service level agreements. Since no active exploits are known, the immediate risk is low, but unpatched systems could become targets if attackers develop exploitation techniques that leverage the memory leak to cause denial of service or other indirect impacts.
Mitigation Recommendations
To mitigate CVE-2024-50172, European organizations should prioritize updating their Linux kernel to the patched versions that address the memory leak in the bnxt_re driver. Specifically, kernel updates containing the fix for the bnxt_re_setup_chip_ctx() function should be applied promptly. Organizations should audit their infrastructure to identify systems using Broadcom NetXtreme RDMA adapters and verify kernel versions. Monitoring tools should be configured to track memory usage trends on affected systems to detect abnormal memory consumption that could indicate the leak in operation. Additionally, implementing kernel live patching where feasible can reduce downtime during updates. For environments where immediate patching is not possible, temporarily disabling RDMA functionality on affected interfaces may reduce exposure. Network and system administrators should also review logs and system metrics for signs of instability or resource exhaustion. Finally, maintaining an up-to-date inventory of hardware and software assets will facilitate rapid response to similar vulnerabilities in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2024-50172: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix a possible memory leak In bnxt_re_setup_chip_ctx() when bnxt_qplib_map_db_bar() fails driver is not freeing the memory allocated for "rdev->chip_ctx".
AI-Powered Analysis
Technical Analysis
CVE-2024-50172 is a vulnerability identified in the Linux kernel specifically affecting the RDMA (Remote Direct Memory Access) driver component for Broadcom NetXtreme (bnxt_re). The issue arises in the function bnxt_re_setup_chip_ctx(), where if the call to bnxt_qplib_map_db_bar() fails, the driver neglects to free the memory allocated for the chip context structure (rdev->chip_ctx). This results in a potential memory leak. Although the vulnerability does not directly lead to code execution or privilege escalation, the memory leak could degrade system performance or stability over time, especially in environments heavily utilizing RDMA for high-performance networking. The vulnerability is present in certain Linux kernel versions identified by the commit hash 0ac20faf5d837b59fb4c041ea320932ed47fd67f. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was reserved on 2024-10-21 and published on 2024-11-07. The problem is rooted in resource management within a low-level driver, which is critical for systems relying on RDMA for fast data transfer, such as data centers and high-performance computing clusters.
Potential Impact
For European organizations, the impact of CVE-2024-50172 is primarily related to system reliability and resource management. Organizations utilizing Linux servers with RDMA-enabled Broadcom NetXtreme network adapters—common in data centers, cloud providers, and HPC environments—may experience gradual memory exhaustion leading to degraded performance or potential system crashes if the memory leak accumulates over time. This can affect availability of critical services, particularly in sectors like finance, telecommunications, research institutions, and cloud infrastructure providers that rely on high-throughput, low-latency networking. While the vulnerability does not appear to compromise confidentiality or integrity directly, the availability impact could disrupt business operations and service level agreements. Since no active exploits are known, the immediate risk is low, but unpatched systems could become targets if attackers develop exploitation techniques that leverage the memory leak to cause denial of service or other indirect impacts.
Mitigation Recommendations
To mitigate CVE-2024-50172, European organizations should prioritize updating their Linux kernel to the patched versions that address the memory leak in the bnxt_re driver. Specifically, kernel updates containing the fix for the bnxt_re_setup_chip_ctx() function should be applied promptly. Organizations should audit their infrastructure to identify systems using Broadcom NetXtreme RDMA adapters and verify kernel versions. Monitoring tools should be configured to track memory usage trends on affected systems to detect abnormal memory consumption that could indicate the leak in operation. Additionally, implementing kernel live patching where feasible can reduce downtime during updates. For environments where immediate patching is not possible, temporarily disabling RDMA functionality on affected interfaces may reduce exposure. Network and system administrators should also review logs and system metrics for signs of instability or resource exhaustion. Finally, maintaining an up-to-date inventory of hardware and software assets will facilitate rapid response to similar vulnerabilities in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.963Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe0186
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 6:10:27 PM
Last updated: 10/16/2025, 12:41:16 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.