Skip to main content

CVE-2024-50170: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50170cvecve-2024-50170
Published: Thu Nov 07 2024 (11/07/2024, 09:31:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: bcmasp: fix potential memory leak in bcmasp_xmit() The bcmasp_xmit() returns NETDEV_TX_OK without freeing skb in case of mapping fails, add dev_kfree_skb() to fix it.

AI-Powered Analysis

AILast updated: 06/28/2025, 18:10:02 UTC

Technical Analysis

CVE-2024-50170 is a vulnerability identified in the Linux kernel, specifically within the bcmasp network driver component. The issue arises in the function bcmasp_xmit(), which is responsible for transmitting network packets. Under certain failure conditions—specifically when the mapping of the socket buffer (skb) fails—the function returns NETDEV_TX_OK without freeing the skb. This behavior leads to a potential memory leak because the allocated skb is not properly released. The patch fixes this by adding a call to dev_kfree_skb() to ensure that the skb is freed when mapping fails, preventing the memory leak. While this vulnerability does not directly enable remote code execution or privilege escalation, the memory leak could degrade system performance or stability over time, especially on systems with high network traffic using the bcmasp driver. The bcmasp driver is used for Broadcom's BCM43xx family of wireless chips, which are common in embedded devices and some Linux-based systems. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability was published on November 7, 2024, and the fix is incorporated in recent Linux kernel updates.

Potential Impact

For European organizations, the primary impact of CVE-2024-50170 is related to system reliability and availability. Systems running Linux kernels with the vulnerable bcmasp driver could experience gradual memory exhaustion due to the leak, potentially leading to degraded network performance or system crashes under sustained network load. This can affect critical infrastructure, embedded devices, or network appliances that rely on Broadcom wireless chipsets. Although this vulnerability does not directly compromise confidentiality or integrity, the resulting instability could disrupt business operations, especially in sectors relying on embedded Linux devices such as telecommunications, manufacturing, and IoT deployments. Organizations with large-scale Linux deployments using affected drivers may face increased maintenance overhead and risk of downtime if the issue is not patched promptly.

Mitigation Recommendations

To mitigate CVE-2024-50170, European organizations should: 1) Identify Linux systems using the bcmasp driver, particularly those with Broadcom BCM43xx wireless chipsets. 2) Apply the latest Linux kernel patches or updates that include the fix for this vulnerability as soon as they become available. 3) Monitor system memory usage and network performance metrics on affected devices to detect signs of memory leaks or instability. 4) For embedded or specialized devices where kernel updates are not straightforward, coordinate with hardware vendors or device manufacturers to obtain patched firmware or kernel versions. 5) Implement network segmentation and redundancy to minimize the impact of potential device failures caused by this vulnerability. 6) Maintain robust backup and recovery procedures to reduce downtime in case of system crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.963Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe017e

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 6:10:02 PM

Last updated: 7/27/2025, 4:46:45 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats