CVE-2024-50145
📋 TL;DR
A NULL pointer dereference vulnerability exists in the Linux kernel's octeon_ep driver when handling SKB allocation failures during network packet processing. This could cause kernel crashes or system instability on systems using this specific network driver. Only Linux systems with the octeon_ep driver enabled are affected.
💻 Affected Systems
- Linux kernel with octeon_ep driver
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially requiring physical reboot of affected systems.
Likely Case
System instability or crashes when under high network load conditions that trigger memory allocation failures in the driver.
If Mitigated
Minor performance impact with dropped packets during memory pressure, but system remains stable.
🎯 Exploit Status
Exploitation requires ability to trigger memory allocation failures in kernel space and specific hardware/driver configuration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel with commits 09ce491112bbf0b866e2638d3e961c1c73d1f00b or later
Vendor Advisory: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify octeon_ep driver is using patched code.
🔧 Temporary Workarounds
Disable octeon_ep driver
linuxPrevent loading of vulnerable driver module
echo 'blacklist octeon_ep' >> /etc/modprobe.d/blacklist.conf
rmmod octeon_ep
🧯 If You Can't Patch
- Monitor system logs for kernel crashes or allocation failures
- Implement network traffic controls to limit traffic to affected interfaces
🔍 How to Verify
Check if Vulnerable:
Check if octeon_ep driver is loaded: lsmod | grep octeon_ep && check kernel version against patched versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits and driver functions properly under network load
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- NULL pointer dereference errors in dmesg
- octeon_ep driver allocation failures
Network Indicators:
- Unusual packet drops on affected interfaces
- Network service interruptions
SIEM Query:
source="kernel" AND ("NULL pointer dereference" OR "octeon_ep" OR "kernel panic")
🔗 References
- https://git.kernel.org/stable/c/09ce491112bbf0b866e2638d3e961c1c73d1f00b
- https://git.kernel.org/stable/c/2dedcb6f99f4c1a11944e7cc35dbeb9b18a5cbac
- https://git.kernel.org/stable/c/c2d2dc4f88bb3cfc4f3cc320fd3ff51b0ae5b0ea
- https://git.kernel.org/stable/c/eb592008f79be52ccef88cd9a5249b3fc0367278
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html