CVE-2024-50169
Linux Kernel vulnerability analysis and mitigation

Overview

In the Linux kernel, a vulnerability (CVE-2024-50169) has been identified and resolved in the vsock subsystem. The issue involves improper handling of rxbytes on readskb() operations, where virtiotransportincrxpkt() and virtiotransportdecrxpkt() calls were not properly balanced. This vulnerability affects Linux kernel versions from 6.4 up to (excluding) 6.6.59, and from 6.7 up to (excluding) 6.11.6, as well as version 6.12 release candidates (rc1, rc2, rc3) (NVD).

Technical details

The vulnerability stems from a failure to update rxbytes after a packet is dequeued in the vsock transport implementation. This leads to a warning condition during SOCKSTREAM recv() operations where the rxqueue is empty but rxbytes remains non-zero. The issue manifests as a warning message: 'rxqueue is empty, but rxbytes is non-zero' followed by a CPU warning at net/vmwvsock/virtiotransport_common.c:589. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The vulnerability can lead to inconsistent state tracking in the vsock subsystem, potentially causing system warnings and affecting the reliability of socket communications. While the immediate impact appears to be limited to system warnings and potential denial of service conditions, it does not appear to enable unauthorized access or data manipulation (NVD).

Mitigation and workarounds

The vulnerability has been fixed through a patch that ensures proper balance between virtiotransportincrxpkt() and virtiotransportdecrxpkt() calls. The fix also includes informing the peer about freed up space and available credit. Users are advised to upgrade to Linux kernel versions 6.6.59, 6.11.6, or later to address this vulnerability (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40205HIGH7.8
  • Linux KernelLinux Kernel
  • linux-hwe-6.14
NoYesNov 12, 2025
CVE-2025-40211HIGH7.1
  • Linux KernelLinux Kernel
  • linux-azure-fde-6.14
NoYesNov 21, 2025
CVE-2025-40206MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-tools-libs-devel
NoYesNov 21, 2025
CVE-2025-40212N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management