Skip to main content

CVE-2024-50235: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50235cvecve-2024-50235
Published: Sat Nov 09 2024 (11/09/2024, 10:14:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: clear wdev->cqm_config pointer on free When we free wdev->cqm_config when unregistering, we also need to clear out the pointer since the same wdev/netdev may get re-registered in another network namespace, then destroyed later, running this code again, which results in a double-free.

AI-Powered Analysis

AILast updated: 06/27/2025, 21:58:18 UTC

Technical Analysis

CVE-2024-50235 is a vulnerability identified in the Linux kernel's Wi-Fi configuration subsystem, specifically within the cfg80211 component responsible for wireless device management. The issue arises from improper handling of the wdev->cqm_config pointer during the unregistration of a wireless device (wdev). When a wireless device is unregistered, the kernel frees the memory allocated to wdev->cqm_config but fails to clear the pointer afterward. This oversight leads to a scenario where the same wireless device or network device (netdev) can be re-registered in a different network namespace and subsequently destroyed again. During this second destruction, the kernel attempts to free the already freed wdev->cqm_config pointer, causing a double-free condition. Double-free vulnerabilities can lead to memory corruption, which attackers might exploit to execute arbitrary code, cause denial of service (system crashes), or escalate privileges within the affected system. Although no known exploits are currently reported in the wild, the nature of this vulnerability in a core kernel component that manages wireless devices makes it a significant concern, especially for systems heavily reliant on Wi-Fi connectivity and network namespaces. The affected versions include several recent Linux kernel commits, indicating that this vulnerability impacts multiple kernel versions before the patch was applied. The vulnerability was published on November 9, 2024, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-50235 can be substantial, particularly for enterprises and service providers that depend on Linux-based infrastructure with wireless capabilities. Exploitation could allow attackers to cause system instability or crashes (denial of service), potentially disrupting critical business operations. More severe exploitation could lead to privilege escalation or arbitrary code execution, compromising confidentiality and integrity of sensitive data. Organizations utilizing network namespaces extensively, such as cloud providers, container platforms, and virtualized environments, are at heightened risk because the vulnerability specifically involves re-registration of wireless devices across namespaces. This could affect data centers, telecommunications infrastructure, and enterprise networks. The disruption of wireless connectivity or kernel stability could impact remote workforces, IoT deployments, and industrial control systems relying on Linux. Given the widespread use of Linux in European public sector, finance, and technology sectors, the vulnerability poses a risk to critical infrastructure and services if left unpatched.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize applying the official Linux kernel patches that address the double-free issue in the cfg80211 module. Kernel updates should be tested in staging environments to ensure compatibility before deployment in production. Organizations should audit their use of network namespaces and wireless device configurations to identify systems that might be exposed. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), and enabling security modules like SELinux or AppArmor can reduce exploitation risk. Monitoring system logs for kernel warnings or crashes related to wireless devices can provide early indicators of attempted exploitation. For environments where immediate patching is not feasible, temporarily disabling or restricting wireless device usage or network namespace re-registration can reduce attack surface. Additionally, maintaining up-to-date intrusion detection systems and endpoint protection solutions that can detect anomalous kernel behavior is recommended. Finally, organizations should ensure robust backup and recovery procedures to minimize impact in case of successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.975Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdcf85

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 9:58:18 PM

Last updated: 7/31/2025, 6:28:00 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats