Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: sfc: Don't invoke xdp_do_flush() from netpoll. Yury reported a crash in the sfc driver originated from netpoll_send_udp(). The netconsole sends a message and then netpoll invokes the driver's NAPI function with a budget of zero. It is dedicated to allow driver to free TX resources, that it may have used while sending the packet. In the netpoll case the driver invokes xdp_do_flush() unconditionally, leading to crash because bpf_net_context was never assigned. Invoke xdp_do_flush() only if budget is not zero.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.11, < 6.11.4 |
References
- https://git.kernel.org/stable/c/55e802468e1d38dec8e25a2fdb6078d45b647e8cPatch
- https://git.kernel.org/stable/c/65d4fc76d75c136744e67754d20feda609e7b793Patch
FAQ
What is CVE-2024-50094?
CVE-2024-50094 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: sfc: Don't invoke xdp_do_flush() from netpoll. Yury reported a crash in the sfc driver originated from netpoll_send_udp(). The net...
How severe is CVE-2024-50094?
CVE-2024-50094 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-50094?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.