CVE-2024-50158

7.8 HIGH

📋 TL;DR

This CVE-2024-50158 is an out-of-bounds write vulnerability in the Linux kernel's bnxt_re RDMA driver that could allow local attackers to cause kernel memory corruption. The vulnerability affects systems using Broadcom NetXtreme-E RDMA adapters with specific kernel versions. Attackers with local access could potentially crash the system or execute arbitrary code with kernel privileges.

💻 Affected Systems

Products:
  • Linux kernel with bnxt_re RDMA driver
Versions: Linux kernel versions containing vulnerable bnxt_re driver code (specific versions not specified in CVE, but patches available for multiple stable branches)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Broadcom NetXtreme-E GenP5 or P7 RDMA adapters and KASAN (Kernel Address Sanitizer) may be required to trigger the specific bug, but similar memory corruption could occur without KASAN.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel mode, allowing complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Kernel panic or system crash leading to denial of service, potentially requiring physical or remote console access to recover.

🟢

If Mitigated

Limited to denial of service if exploit attempts are detected and blocked by security controls.

🌐 Internet-Facing: LOW - Requires local access to the system; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or compromised user accounts could exploit this to escalate privileges or cause system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of driver internals; KASAN detection suggests this was found through fuzzing or code review rather than active exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in Linux kernel stable commits: 05c5fcc1869a08e36a29691699b6534e5a00a82b, a9e6e7443922ac0a48243c35d03834c96926bff1, c11b9b03ea5252898f91f3388c248f0dc47bda52

Vendor Advisory: https://git.kernel.org/stable/c/05c5fcc1869a08e36a29691699b6534e5a00a82b

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Check your distribution's security advisories for specific kernel packages. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable bnxt_re module

linux

Prevent loading of vulnerable RDMA driver if not required

echo 'blacklist bnxt_re' >> /etc/modprobe.d/blacklist-bnxt_re.conf
rmmod bnxt_re

Restrict module loading

linux

Prevent unauthorized loading of kernel modules

echo 'kernel.modules_disabled=1' >> /etc/sysctl.conf
sysctl -p

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor system logs for kernel panic or oops messages related to bnxt_re

🔍 How to Verify

Check if Vulnerable:

Check if bnxt_re module is loaded: lsmod | grep bnxt_re. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes one of the fix commits: uname -r and check with distribution vendor. Confirm bnxt_re module version if available.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages mentioning bnxt_re
  • KASAN error reports with slab-out-of-bounds
  • System crashes or panics when RDMA operations are performed

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("bnxt_re" OR "KASAN: slab-out-of-bounds")

🔗 References

📤 Share & Export