CVE-2024-50073: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace: <TASK> gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm] __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389 update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500 __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846 __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm] _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107 __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm] ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195 ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79 __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338 __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818 Allocated by task 65: gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm] gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm] gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm] gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm] tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391 tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39 flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445 process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229 worker_thread+0x3dc/0x950 kernel/workqueue.c:3391 kthread+0x2a3/0x370 kernel/kthread.c:389 ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257 Freed by task 3367: kfree+0x126/0x420 mm/slub.c:4580 gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm] tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818 [Analysis] gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux can be freed by multi threads through ioctl,which leads to the occurrence of uaf. Protect it by gsm tx lock.
AI Analysis
Technical Summary
CVE-2024-50073 is a high-severity use-after-free vulnerability in the Linux kernel's GSM (Global System for Mobile Communications) multiplexing driver, specifically within the n_gsm module. The vulnerability arises from improper handling of memory in the gsm_cleanup_mux function, where gsm_msg objects on the tx_ctrl_list or tx_data_list can be freed concurrently by multiple threads via ioctl calls without adequate synchronization. This leads to a use-after-free condition, as demonstrated by the Kernel Address Sanitizer (KASAN) detecting slab-use-after-free errors during the cleanup process. The root cause is a race condition where multiple threads can free the same memory object, causing subsequent accesses to invalid memory. The vulnerability affects Linux kernel versions around 6.11.0+ and involves kernel-space code that handles tty (teletypewriter) devices related to GSM multiplexing. Exploitation requires local privileges (low privilege level) but no user interaction, and the attack vector is local (AV:L). The impact includes full compromise of confidentiality, integrity, and availability of the affected system due to kernel memory corruption. The vulnerability has been addressed by introducing proper locking (gsm tx lock) to serialize access and prevent concurrent frees. No known exploits are reported in the wild as of the publication date (October 29, 2024). The CVSS v3.1 score is 7.8, reflecting the high impact and relatively low complexity of exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those running Linux-based infrastructure, including servers, embedded systems, and network devices that utilize the n_gsm driver or related GSM multiplexing functionality. The kernel-level nature of the flaw means successful exploitation could allow attackers to execute arbitrary code with kernel privileges, leading to full system compromise, data breaches, or denial of service. Critical infrastructure operators, telecom providers, and enterprises relying on Linux for telecommunication or IoT gateways could be particularly impacted. Given the local attack vector, threat actors would need some form of local access or ability to execute code on the target system, which could be achieved through other vulnerabilities or insider threats. The vulnerability could also be leveraged in chained attacks to escalate privileges. The absence of known exploits in the wild currently reduces immediate risk, but the high severity score and kernel-level impact necessitate prompt patching to prevent future exploitation. Additionally, the complexity of the bug and its presence in the kernel's tty subsystem means that unpatched systems could suffer from stability issues or crashes if exploited.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the patched versions that fix CVE-2024-50073. Since the vulnerability is in the n_gsm driver, organizations should audit their systems to identify if this driver is in use, especially in telecom, embedded, or IoT devices. For systems where immediate patching is not feasible, consider disabling the n_gsm module if it is not required, to reduce the attack surface. Implement strict access controls and monitoring to limit local user privileges and detect suspicious ioctl calls or kernel module interactions. Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. Additionally, ensure that endpoint security solutions are configured to detect anomalous local activity that could indicate exploitation attempts. For critical infrastructure, consider network segmentation to isolate vulnerable systems and reduce the risk of lateral movement. Finally, maintain an up-to-date inventory of Linux kernel versions and apply security patches promptly as part of a robust vulnerability management program.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2024-50073: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ffff88815fe99c00 by task poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace: <TASK> gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm] __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389 update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500 __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846 __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm] _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107 __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm] ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195 ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79 __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338 __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818 Allocated by task 65: gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm] gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm] gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm] gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm] tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391 tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39 flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445 process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229 worker_thread+0x3dc/0x950 kernel/workqueue.c:3391 kthread+0x2a3/0x370 kernel/kthread.c:389 ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257 Freed by task 3367: kfree+0x126/0x420 mm/slub.c:4580 gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm] tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818 [Analysis] gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux can be freed by multi threads through ioctl,which leads to the occurrence of uaf. Protect it by gsm tx lock.
AI-Powered Analysis
Technical Analysis
CVE-2024-50073 is a high-severity use-after-free vulnerability in the Linux kernel's GSM (Global System for Mobile Communications) multiplexing driver, specifically within the n_gsm module. The vulnerability arises from improper handling of memory in the gsm_cleanup_mux function, where gsm_msg objects on the tx_ctrl_list or tx_data_list can be freed concurrently by multiple threads via ioctl calls without adequate synchronization. This leads to a use-after-free condition, as demonstrated by the Kernel Address Sanitizer (KASAN) detecting slab-use-after-free errors during the cleanup process. The root cause is a race condition where multiple threads can free the same memory object, causing subsequent accesses to invalid memory. The vulnerability affects Linux kernel versions around 6.11.0+ and involves kernel-space code that handles tty (teletypewriter) devices related to GSM multiplexing. Exploitation requires local privileges (low privilege level) but no user interaction, and the attack vector is local (AV:L). The impact includes full compromise of confidentiality, integrity, and availability of the affected system due to kernel memory corruption. The vulnerability has been addressed by introducing proper locking (gsm tx lock) to serialize access and prevent concurrent frees. No known exploits are reported in the wild as of the publication date (October 29, 2024). The CVSS v3.1 score is 7.8, reflecting the high impact and relatively low complexity of exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those running Linux-based infrastructure, including servers, embedded systems, and network devices that utilize the n_gsm driver or related GSM multiplexing functionality. The kernel-level nature of the flaw means successful exploitation could allow attackers to execute arbitrary code with kernel privileges, leading to full system compromise, data breaches, or denial of service. Critical infrastructure operators, telecom providers, and enterprises relying on Linux for telecommunication or IoT gateways could be particularly impacted. Given the local attack vector, threat actors would need some form of local access or ability to execute code on the target system, which could be achieved through other vulnerabilities or insider threats. The vulnerability could also be leveraged in chained attacks to escalate privileges. The absence of known exploits in the wild currently reduces immediate risk, but the high severity score and kernel-level impact necessitate prompt patching to prevent future exploitation. Additionally, the complexity of the bug and its presence in the kernel's tty subsystem means that unpatched systems could suffer from stability issues or crashes if exploited.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the patched versions that fix CVE-2024-50073. Since the vulnerability is in the n_gsm driver, organizations should audit their systems to identify if this driver is in use, especially in telecom, embedded, or IoT devices. For systems where immediate patching is not feasible, consider disabling the n_gsm module if it is not required, to reduce the attack surface. Implement strict access controls and monitoring to limit local user privileges and detect suspicious ioctl calls or kernel module interactions. Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. Additionally, ensure that endpoint security solutions are configured to detect anomalous local activity that could indicate exploitation attempts. For critical infrastructure, consider network segmentation to isolate vulnerable systems and reduce the risk of lateral movement. Finally, maintain an up-to-date inventory of Linux kernel versions and apply security patches promptly as part of a robust vulnerability management program.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.940Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfe88
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 7/2/2025, 11:54:42 PM
Last updated: 8/14/2025, 7:11:23 AM
Views: 22
Related Threats
CVE-2025-8950: SQL Injection in Campcodes Online Recruitment Management System
MediumCVE-2025-27388: CWE-20 Improper Input Validation in OPPO OPPO HEALTH APP
HighCVE-2025-8949: Stack-based Buffer Overflow in D-Link DIR-825
HighCVE-2025-8948: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-8947: SQL Injection in projectworlds Visitor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.