CVE-2024-50129

7.8 HIGH

📋 TL;DR

This CVE describes an out-of-bounds memory access vulnerability in the Linux kernel's PSE-PD (Power Sourcing Equipment - Power Delivery) subsystem. An attacker could potentially exploit this to cause kernel crashes or execute arbitrary code with kernel privileges. All Linux systems using the affected kernel versions are vulnerable if the PSE-PD functionality is enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE description, but likely recent kernel versions before the fix commits.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if PSE-PD subsystem is enabled and in use. Many systems may not have this functionality enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential kernel privilege escalation allowing full system compromise.

🟠

Likely Case

System instability, kernel crashes, or denial of service conditions affecting network functionality.

🟢

If Mitigated

Minimal impact if PSE-PD functionality is disabled or systems are properly segmented.

🌐 Internet-Facing: LOW - This requires local access or specialized network access to PSE-PD interfaces.
🏢 Internal Only: MEDIUM - Internal attackers with access to affected systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to the affected kernel module and understanding of PSE-PD subsystem interactions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 50ea68146d82f34b3ad80d8290ef8222136dedd7 and f2767a41959e60763949c73ee180e40c686e807e

Vendor Advisory: https://git.kernel.org/stable/c/50ea68146d82f34b3ad80d8290ef8222136dedd7

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable PSE-PD module

linux

Prevent loading of the vulnerable kernel module

echo 'blacklist pse_pd' >> /etc/modprobe.d/blacklist.conf
rmmod pse_pd

🧯 If You Can't Patch

  • Disable PSE-PD functionality if not required
  • Implement strict access controls to limit who can interact with PSE-PD interfaces

🔍 How to Verify

Check if Vulnerable:

Check if PSE-PD module is loaded: lsmod | grep pse_pd. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: uname -r. Check if system remains stable during PSE-PD operations.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Out of bounds memory access errors in kernel logs
  • System crash/reboot events

Network Indicators:

  • Unusual PSE-PD protocol traffic patterns
  • Network interface instability

SIEM Query:

source="kernel" AND ("panic" OR "oops" OR "out of bounds") AND "pse"

🔗 References

📤 Share & Export