Skip to main content

CVE-2024-35858: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35858cvecve-2024-35858
Published: Fri May 17 2024 (05/17/2024, 14:47:33 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: bcmasp: fix memory leak when bringing down interface When bringing down the TX rings we flush the rings but forget to reclaimed the flushed packets. This leads to a memory leak since we do not free the dma mapped buffers. This also leads to tx control block corruption when bringing down the interface for power management.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:42:12 UTC

Technical Analysis

CVE-2024-35858 is a vulnerability identified in the Linux kernel, specifically within the bcmasp network driver component. The issue arises during the process of bringing down network interfaces, where the TX (transmit) rings are flushed but the flushed packets are not properly reclaimed. This results in a memory leak because the DMA (Direct Memory Access) mapped buffers associated with these packets are not freed. Additionally, this flaw causes corruption of the transmit control blocks when the interface is brought down, particularly impacting power management operations. The vulnerability is rooted in improper resource management in the network driver code, leading to both memory leaks and data structure corruption. Although no known exploits are currently reported in the wild, the flaw could potentially be triggered by an attacker or a misbehaving process that repeatedly brings down network interfaces, causing resource exhaustion or instability in the affected system. The affected versions are identified by specific Linux kernel commits, indicating that this is a recent issue addressed in the kernel source. The vulnerability does not require user interaction or authentication to manifest, as it is related to kernel-level network interface management.

Potential Impact

For European organizations, the impact of CVE-2024-35858 could be significant, especially for those relying heavily on Linux-based infrastructure for networking and power management. Memory leaks in kernel drivers can lead to gradual resource depletion, causing system slowdowns, crashes, or reboots, which in turn can disrupt critical services and operations. The corruption of transmit control blocks may also lead to network instability or failures, affecting data transmission reliability. Organizations operating data centers, cloud services, telecommunications infrastructure, or industrial control systems using Linux kernels with the vulnerable bcmasp driver could experience degraded performance or outages. While the vulnerability does not directly enable remote code execution or privilege escalation, the resulting denial of service or system instability could be exploited as part of a broader attack chain. This is particularly relevant for sectors such as finance, healthcare, manufacturing, and government services in Europe, where uptime and data integrity are paramount.

Mitigation Recommendations

To mitigate CVE-2024-35858, European organizations should prioritize updating their Linux kernel to the latest patched versions where this vulnerability is resolved. Since the issue is in the bcmasp network driver, auditing systems to identify those using this driver is critical. Network administrators should monitor system logs and kernel messages for signs of memory leaks or interface-related errors. Implementing automated kernel update mechanisms can reduce the window of exposure. Additionally, organizations should review power management and network interface shutdown procedures to ensure they are not triggering the vulnerability repeatedly. For environments where immediate patching is not feasible, limiting the ability to bring down network interfaces to trusted administrators and restricting access to kernel module loading can reduce risk. Finally, incorporating memory and resource monitoring tools can help detect abnormal resource consumption indicative of exploitation attempts or system instability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.106Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe3694

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:42:12 PM

Last updated: 8/12/2025, 12:18:55 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats