Skip to main content

CVE-2024-50297: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50297cvecve-2024-50297
Published: Tue Nov 19 2024 (11/19/2024, 01:30:44 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: xilinx: axienet: Enqueue Tx packets in dql before dmaengine starts Enqueue packets in dql after dma engine starts causes race condition. Tx transfer starts once dma engine is started and may execute dql dequeue in completion before it gets queued. It results in following kernel crash while running iperf stress test: kernel BUG at lib/dynamic_queue_limits.c:99! <snip> Internal error: Oops - BUG: 00000000f2000800 [#1] SMP pc : dql_completed+0x238/0x248 lr : dql_completed+0x3c/0x248 Call trace: dql_completed+0x238/0x248 axienet_dma_tx_cb+0xa0/0x170 xilinx_dma_do_tasklet+0xdc/0x290 tasklet_action_common+0xf8/0x11c tasklet_action+0x30/0x3c handle_softirqs+0xf8/0x230 <snip> Start dmaengine after enqueue in dql fixes the crash.

AI-Powered Analysis

AILast updated: 06/28/2025, 13:56:08 UTC

Technical Analysis

CVE-2024-50297 is a vulnerability identified in the Linux kernel specifically affecting the Xilinx AXI Ethernet (axienet) driver within the network subsystem. The flaw arises from a race condition related to the handling of transmit (Tx) packets in the dynamic queue limits (dql) mechanism when used in conjunction with the DMA engine. The vulnerability occurs because Tx packets are enqueued into the dql after the DMA engine has started, which can cause the DMA engine's Tx transfer to begin and potentially execute the dql dequeue completion callback before the packet is actually queued. This improper sequencing leads to a kernel crash, as evidenced by a BUG triggered in the kernel's dynamic_queue_limits.c code during stress testing with iperf. The root cause is that the DMA engine's Tx callback (axienet_dma_tx_cb) and subsequent tasklet handling can complete dequeuing operations prematurely, causing inconsistent queue state and kernel oops. The fix involves ensuring that packets are enqueued into the dql before the DMA engine is started, thus preventing the race condition and subsequent kernel crash. This vulnerability affects Linux kernel versions containing the specified commit (6a91b846af85a24241decd686269e8e038eb13d1) and is relevant to systems using the Xilinx axienet driver, commonly found in embedded and specialized networking hardware. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-50297 primarily concerns systems running Linux kernels with the affected axienet driver, which is typically used in embedded devices or specialized network equipment leveraging Xilinx FPGA-based Ethernet interfaces. The vulnerability can cause kernel crashes leading to denial of service (DoS) conditions, potentially disrupting network communications and critical services relying on these devices. While this does not directly lead to privilege escalation or data leakage, the resulting instability can affect availability and reliability of network infrastructure. Organizations in sectors such as telecommunications, industrial automation, and research institutions using Xilinx-based networking hardware are at higher risk. The disruption could impact operational technology (OT) environments and network edge devices, which are critical for maintaining continuous service. Given the absence of known exploits, the immediate threat level is moderate, but the potential for service outages necessitates prompt attention.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify and inventory all Linux systems running kernels with the affected axienet driver, focusing on embedded and network devices using Xilinx Ethernet interfaces. 2) Apply the official Linux kernel patches that reorder the enqueue operation to occur before the DMA engine starts, as committed in the relevant kernel update (commit 6a91b846af85a24241decd686269e8e038eb13d1). 3) For devices where kernel patching is not immediately feasible, consider implementing network segmentation and redundancy to minimize impact from potential device crashes. 4) Monitor kernel logs and system stability metrics for signs of the described kernel BUG or unexpected reboots, especially under network stress conditions like iperf testing. 5) Engage with hardware vendors to obtain firmware or driver updates that incorporate the fix if the affected devices are vendor-supplied. 6) Incorporate this vulnerability into vulnerability management and patching cycles, prioritizing devices critical to network availability. 7) Test patches in controlled environments to ensure no regressions in device functionality before wide deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.986Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdf76a

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 1:56:08 PM

Last updated: 8/17/2025, 6:03:11 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats