CVE-2024-50297: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: xilinx: axienet: Enqueue Tx packets in dql before dmaengine starts Enqueue packets in dql after dma engine starts causes race condition. Tx transfer starts once dma engine is started and may execute dql dequeue in completion before it gets queued. It results in following kernel crash while running iperf stress test: kernel BUG at lib/dynamic_queue_limits.c:99! <snip> Internal error: Oops - BUG: 00000000f2000800 [#1] SMP pc : dql_completed+0x238/0x248 lr : dql_completed+0x3c/0x248 Call trace: dql_completed+0x238/0x248 axienet_dma_tx_cb+0xa0/0x170 xilinx_dma_do_tasklet+0xdc/0x290 tasklet_action_common+0xf8/0x11c tasklet_action+0x30/0x3c handle_softirqs+0xf8/0x230 <snip> Start dmaengine after enqueue in dql fixes the crash.
AI Analysis
Technical Summary
CVE-2024-50297 is a vulnerability identified in the Linux kernel specifically affecting the Xilinx AXI Ethernet (axienet) driver within the network subsystem. The flaw arises from a race condition related to the handling of transmit (Tx) packets in the dynamic queue limits (dql) mechanism when used in conjunction with the DMA engine. The vulnerability occurs because Tx packets are enqueued into the dql after the DMA engine has started, which can cause the DMA engine's Tx transfer to begin and potentially execute the dql dequeue completion callback before the packet is actually queued. This improper sequencing leads to a kernel crash, as evidenced by a BUG triggered in the kernel's dynamic_queue_limits.c code during stress testing with iperf. The root cause is that the DMA engine's Tx callback (axienet_dma_tx_cb) and subsequent tasklet handling can complete dequeuing operations prematurely, causing inconsistent queue state and kernel oops. The fix involves ensuring that packets are enqueued into the dql before the DMA engine is started, thus preventing the race condition and subsequent kernel crash. This vulnerability affects Linux kernel versions containing the specified commit (6a91b846af85a24241decd686269e8e038eb13d1) and is relevant to systems using the Xilinx axienet driver, commonly found in embedded and specialized networking hardware. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-50297 primarily concerns systems running Linux kernels with the affected axienet driver, which is typically used in embedded devices or specialized network equipment leveraging Xilinx FPGA-based Ethernet interfaces. The vulnerability can cause kernel crashes leading to denial of service (DoS) conditions, potentially disrupting network communications and critical services relying on these devices. While this does not directly lead to privilege escalation or data leakage, the resulting instability can affect availability and reliability of network infrastructure. Organizations in sectors such as telecommunications, industrial automation, and research institutions using Xilinx-based networking hardware are at higher risk. The disruption could impact operational technology (OT) environments and network edge devices, which are critical for maintaining continuous service. Given the absence of known exploits, the immediate threat level is moderate, but the potential for service outages necessitates prompt attention.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory all Linux systems running kernels with the affected axienet driver, focusing on embedded and network devices using Xilinx Ethernet interfaces. 2) Apply the official Linux kernel patches that reorder the enqueue operation to occur before the DMA engine starts, as committed in the relevant kernel update (commit 6a91b846af85a24241decd686269e8e038eb13d1). 3) For devices where kernel patching is not immediately feasible, consider implementing network segmentation and redundancy to minimize impact from potential device crashes. 4) Monitor kernel logs and system stability metrics for signs of the described kernel BUG or unexpected reboots, especially under network stress conditions like iperf testing. 5) Engage with hardware vendors to obtain firmware or driver updates that incorporate the fix if the affected devices are vendor-supplied. 6) Incorporate this vulnerability into vulnerability management and patching cycles, prioritizing devices critical to network availability. 7) Test patches in controlled environments to ensure no regressions in device functionality before wide deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2024-50297: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: xilinx: axienet: Enqueue Tx packets in dql before dmaengine starts Enqueue packets in dql after dma engine starts causes race condition. Tx transfer starts once dma engine is started and may execute dql dequeue in completion before it gets queued. It results in following kernel crash while running iperf stress test: kernel BUG at lib/dynamic_queue_limits.c:99! <snip> Internal error: Oops - BUG: 00000000f2000800 [#1] SMP pc : dql_completed+0x238/0x248 lr : dql_completed+0x3c/0x248 Call trace: dql_completed+0x238/0x248 axienet_dma_tx_cb+0xa0/0x170 xilinx_dma_do_tasklet+0xdc/0x290 tasklet_action_common+0xf8/0x11c tasklet_action+0x30/0x3c handle_softirqs+0xf8/0x230 <snip> Start dmaengine after enqueue in dql fixes the crash.
AI-Powered Analysis
Technical Analysis
CVE-2024-50297 is a vulnerability identified in the Linux kernel specifically affecting the Xilinx AXI Ethernet (axienet) driver within the network subsystem. The flaw arises from a race condition related to the handling of transmit (Tx) packets in the dynamic queue limits (dql) mechanism when used in conjunction with the DMA engine. The vulnerability occurs because Tx packets are enqueued into the dql after the DMA engine has started, which can cause the DMA engine's Tx transfer to begin and potentially execute the dql dequeue completion callback before the packet is actually queued. This improper sequencing leads to a kernel crash, as evidenced by a BUG triggered in the kernel's dynamic_queue_limits.c code during stress testing with iperf. The root cause is that the DMA engine's Tx callback (axienet_dma_tx_cb) and subsequent tasklet handling can complete dequeuing operations prematurely, causing inconsistent queue state and kernel oops. The fix involves ensuring that packets are enqueued into the dql before the DMA engine is started, thus preventing the race condition and subsequent kernel crash. This vulnerability affects Linux kernel versions containing the specified commit (6a91b846af85a24241decd686269e8e038eb13d1) and is relevant to systems using the Xilinx axienet driver, commonly found in embedded and specialized networking hardware. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-50297 primarily concerns systems running Linux kernels with the affected axienet driver, which is typically used in embedded devices or specialized network equipment leveraging Xilinx FPGA-based Ethernet interfaces. The vulnerability can cause kernel crashes leading to denial of service (DoS) conditions, potentially disrupting network communications and critical services relying on these devices. While this does not directly lead to privilege escalation or data leakage, the resulting instability can affect availability and reliability of network infrastructure. Organizations in sectors such as telecommunications, industrial automation, and research institutions using Xilinx-based networking hardware are at higher risk. The disruption could impact operational technology (OT) environments and network edge devices, which are critical for maintaining continuous service. Given the absence of known exploits, the immediate threat level is moderate, but the potential for service outages necessitates prompt attention.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory all Linux systems running kernels with the affected axienet driver, focusing on embedded and network devices using Xilinx Ethernet interfaces. 2) Apply the official Linux kernel patches that reorder the enqueue operation to occur before the DMA engine starts, as committed in the relevant kernel update (commit 6a91b846af85a24241decd686269e8e038eb13d1). 3) For devices where kernel patching is not immediately feasible, consider implementing network segmentation and redundancy to minimize impact from potential device crashes. 4) Monitor kernel logs and system stability metrics for signs of the described kernel BUG or unexpected reboots, especially under network stress conditions like iperf testing. 5) Engage with hardware vendors to obtain firmware or driver updates that incorporate the fix if the affected devices are vendor-supplied. 6) Incorporate this vulnerability into vulnerability management and patching cycles, prioritizing devices critical to network availability. 7) Test patches in controlled environments to ensure no regressions in device functionality before wide deployment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.986Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdf76a
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 1:56:08 PM
Last updated: 8/17/2025, 6:03:11 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.