CVE-2024-50172: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix a possible memory leak In bnxt_re_setup_chip_ctx() when bnxt_qplib_map_db_bar() fails driver is not freeing the memory allocated for "rdev->chip_ctx".
AI Analysis
Technical Summary
CVE-2024-50172 is a vulnerability identified in the Linux kernel specifically affecting the RDMA (Remote Direct Memory Access) driver component for Broadcom NetXtreme (bnxt_re). The issue arises in the function bnxt_re_setup_chip_ctx(), where if the call to bnxt_qplib_map_db_bar() fails, the driver neglects to free the memory allocated for the chip context structure (rdev->chip_ctx). This results in a potential memory leak. Although the vulnerability does not directly lead to code execution or privilege escalation, the memory leak could degrade system performance or stability over time, especially in environments heavily utilizing RDMA for high-performance networking. The vulnerability is present in certain Linux kernel versions identified by the commit hash 0ac20faf5d837b59fb4c041ea320932ed47fd67f. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was reserved on 2024-10-21 and published on 2024-11-07. The problem is rooted in resource management within a low-level driver, which is critical for systems relying on RDMA for fast data transfer, such as data centers and high-performance computing clusters.
Potential Impact
For European organizations, the impact of CVE-2024-50172 is primarily related to system reliability and resource management. Organizations utilizing Linux servers with RDMA-enabled Broadcom NetXtreme network adapters—common in data centers, cloud providers, and HPC environments—may experience gradual memory exhaustion leading to degraded performance or potential system crashes if the memory leak accumulates over time. This can affect availability of critical services, particularly in sectors like finance, telecommunications, research institutions, and cloud infrastructure providers that rely on high-throughput, low-latency networking. While the vulnerability does not appear to compromise confidentiality or integrity directly, the availability impact could disrupt business operations and service level agreements. Since no active exploits are known, the immediate risk is low, but unpatched systems could become targets if attackers develop exploitation techniques that leverage the memory leak to cause denial of service or other indirect impacts.
Mitigation Recommendations
To mitigate CVE-2024-50172, European organizations should prioritize updating their Linux kernel to the patched versions that address the memory leak in the bnxt_re driver. Specifically, kernel updates containing the fix for the bnxt_re_setup_chip_ctx() function should be applied promptly. Organizations should audit their infrastructure to identify systems using Broadcom NetXtreme RDMA adapters and verify kernel versions. Monitoring tools should be configured to track memory usage trends on affected systems to detect abnormal memory consumption that could indicate the leak in operation. Additionally, implementing kernel live patching where feasible can reduce downtime during updates. For environments where immediate patching is not possible, temporarily disabling RDMA functionality on affected interfaces may reduce exposure. Network and system administrators should also review logs and system metrics for signs of instability or resource exhaustion. Finally, maintaining an up-to-date inventory of hardware and software assets will facilitate rapid response to similar vulnerabilities in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2024-50172: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix a possible memory leak In bnxt_re_setup_chip_ctx() when bnxt_qplib_map_db_bar() fails driver is not freeing the memory allocated for "rdev->chip_ctx".
AI-Powered Analysis
Technical Analysis
CVE-2024-50172 is a vulnerability identified in the Linux kernel specifically affecting the RDMA (Remote Direct Memory Access) driver component for Broadcom NetXtreme (bnxt_re). The issue arises in the function bnxt_re_setup_chip_ctx(), where if the call to bnxt_qplib_map_db_bar() fails, the driver neglects to free the memory allocated for the chip context structure (rdev->chip_ctx). This results in a potential memory leak. Although the vulnerability does not directly lead to code execution or privilege escalation, the memory leak could degrade system performance or stability over time, especially in environments heavily utilizing RDMA for high-performance networking. The vulnerability is present in certain Linux kernel versions identified by the commit hash 0ac20faf5d837b59fb4c041ea320932ed47fd67f. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was reserved on 2024-10-21 and published on 2024-11-07. The problem is rooted in resource management within a low-level driver, which is critical for systems relying on RDMA for fast data transfer, such as data centers and high-performance computing clusters.
Potential Impact
For European organizations, the impact of CVE-2024-50172 is primarily related to system reliability and resource management. Organizations utilizing Linux servers with RDMA-enabled Broadcom NetXtreme network adapters—common in data centers, cloud providers, and HPC environments—may experience gradual memory exhaustion leading to degraded performance or potential system crashes if the memory leak accumulates over time. This can affect availability of critical services, particularly in sectors like finance, telecommunications, research institutions, and cloud infrastructure providers that rely on high-throughput, low-latency networking. While the vulnerability does not appear to compromise confidentiality or integrity directly, the availability impact could disrupt business operations and service level agreements. Since no active exploits are known, the immediate risk is low, but unpatched systems could become targets if attackers develop exploitation techniques that leverage the memory leak to cause denial of service or other indirect impacts.
Mitigation Recommendations
To mitigate CVE-2024-50172, European organizations should prioritize updating their Linux kernel to the patched versions that address the memory leak in the bnxt_re driver. Specifically, kernel updates containing the fix for the bnxt_re_setup_chip_ctx() function should be applied promptly. Organizations should audit their infrastructure to identify systems using Broadcom NetXtreme RDMA adapters and verify kernel versions. Monitoring tools should be configured to track memory usage trends on affected systems to detect abnormal memory consumption that could indicate the leak in operation. Additionally, implementing kernel live patching where feasible can reduce downtime during updates. For environments where immediate patching is not possible, temporarily disabling RDMA functionality on affected interfaces may reduce exposure. Network and system administrators should also review logs and system metrics for signs of instability or resource exhaustion. Finally, maintaining an up-to-date inventory of hardware and software assets will facilitate rapid response to similar vulnerabilities in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.963Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe0186
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 6:10:27 PM
Last updated: 7/26/2025, 11:58:47 PM
Views: 11
Related Threats
CVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighCVE-2025-47444: CWE-201 Insertion of Sensitive Information Into Sent Data in Liquid Web GiveWP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.