Skip to main content

CVE-2024-27048: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-27048cvecve-2024-27048
Published: Wed May 01 2024 (05/01/2024, 12:54:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: brcm80211: handle pmk_op allocation failure The kzalloc() in brcmf_pmksa_v3_op() will return null if the physical memory has run out. As a result, if we dereference the null value, the null pointer dereference bug will happen. Return -ENOMEM from brcmf_pmksa_v3_op() if kzalloc() fails for pmk_op.

AI-Powered Analysis

AILast updated: 06/29/2025, 14:42:43 UTC

Technical Analysis

CVE-2024-27048 is a vulnerability identified in the Linux kernel, specifically within the Broadcom brcm80211 wireless driver component. The issue arises in the function brcmf_pmksa_v3_op(), which is responsible for handling PMKSA (Pairwise Master Key Security Association) operations related to Wi-Fi security. The vulnerability is due to improper handling of memory allocation failures: the function calls kzalloc() to allocate memory for a pmk_op structure, but if the system is under heavy memory pressure and kzalloc() returns NULL, the code does not properly check for this failure before dereferencing the pointer. This results in a null pointer dereference, which can cause a kernel panic or system crash, leading to a denial of service (DoS) condition. The patch for this vulnerability involves adding a check to return -ENOMEM (out of memory error) if kzalloc() fails, preventing the null pointer dereference. This vulnerability is a classic example of insufficient error handling in kernel code, which can be triggered by exhausting physical memory resources. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions containing the specified commit hash a96202acaea47fa8377088e0952bb63bd02a3bab and likely other versions incorporating the vulnerable code. Since the flaw is in a wireless driver, it specifically impacts systems using Broadcom Wi-Fi chipsets supported by brcm80211, which are common in many laptops, embedded devices, and some servers. Exploitation requires the attacker to induce memory exhaustion or trigger the vulnerable code path, which may require local access or specific conditions. No authentication or user interaction is explicitly required to cause the null pointer dereference once the vulnerable code is executed.

Potential Impact

For European organizations, the primary impact of CVE-2024-27048 is the potential for denial of service on Linux-based systems using Broadcom wireless drivers. This could disrupt critical network connectivity, especially in environments relying on Wi-Fi for operational continuity, such as offices, industrial control systems, or public service infrastructure. Systems crashing due to kernel panics can lead to downtime, loss of productivity, and potential cascading failures in network-dependent services. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the DoS impact can be significant in environments where high availability is required. Additionally, organizations with large deployments of Linux devices with Broadcom Wi-Fi chipsets, such as universities, research institutions, and enterprises using Linux laptops or embedded devices, may face increased risk. The lack of known exploits reduces immediate threat, but the vulnerability should be addressed promptly to avoid future exploitation, especially as attackers may develop techniques to trigger memory exhaustion remotely or via crafted network traffic. The impact on confidentiality and integrity is minimal, but availability is directly affected.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the patched version that includes the fix for CVE-2024-27048. Specifically, ensure that the Linux kernel version includes the commit that adds the NULL check and returns -ENOMEM on allocation failure in brcmf_pmksa_v3_op(). For systems where immediate patching is not feasible, consider the following mitigations: 1) Monitor system logs for kernel panics or crashes related to brcm80211 or wireless operations to detect potential exploitation attempts. 2) Limit memory exhaustion risks by configuring system resource limits and monitoring memory usage to prevent kzalloc() failures. 3) Restrict access to vulnerable systems to trusted users and networks to reduce the chance of triggering the vulnerability. 4) For critical infrastructure, consider disabling or replacing Broadcom wireless drivers with alternative hardware or drivers if patching is delayed. 5) Employ kernel hardening techniques and memory protection mechanisms to reduce the impact of null pointer dereferences. 6) Maintain up-to-date intrusion detection systems that can alert on unusual wireless driver behavior or system crashes. These steps, combined with timely patching, will mitigate the risk posed by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.213Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe31ee

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 2:42:43 PM

Last updated: 8/16/2025, 9:19:49 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats