Skip to main content

CVE-2024-50236: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50236cvecve-2024-50236
Published: Sat Nov 09 2024 (11/09/2024, 10:14:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Fix memory leak in management tx In the current logic, memory is allocated for storing the MSDU context during management packet TX but this memory is not being freed during management TX completion. Similar leaks are seen in the management TX cleanup logic. Kmemleak reports this problem as below, unreferenced object 0xffffff80b64ed250 (size 16): comm "kworker/u16:7", pid 148, jiffies 4294687130 (age 714.199s) hex dump (first 16 bytes): 00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00 .+.......t...... backtrace: [<ffffffe6e7b245dc>] __kmem_cache_alloc_node+0x1e4/0x2d8 [<ffffffe6e7adde88>] kmalloc_trace+0x48/0x110 [<ffffffe6bbd765fc>] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core] [<ffffffe6bbd3eed4>] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core] [<ffffffe6e78d5974>] process_scheduled_works+0x1ac/0x400 [<ffffffe6e78d60b8>] worker_thread+0x208/0x328 [<ffffffe6e78dc890>] kthread+0x100/0x1c0 [<ffffffe6e78166c0>] ret_from_fork+0x10/0x20 Free the memory during completion and cleanup to fix the leak. Protect the mgmt_pending_tx idr_remove() operation in ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar->data_lock similar to other instances. Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1

AI-Powered Analysis

AILast updated: 06/28/2025, 13:12:27 UTC

Technical Analysis

CVE-2024-50236 is a vulnerability identified in the Linux kernel specifically affecting the ath10k wireless driver, which is responsible for managing Qualcomm Atheros Wi-Fi chipsets. The flaw is a memory leak occurring during the transmission of management frames (management TX). In the current implementation, memory is allocated to store the MSDU (MAC Service Data Unit) context when sending management packets, but this allocated memory is not properly freed upon completion of the transmission or during cleanup operations. This leads to a gradual accumulation of unreferenced memory objects, as reported by the kernel memory leak detector (kmemleak). The root cause is the missing deallocation of memory in the management TX completion and cleanup logic. Additionally, the vulnerability involves a concurrency issue where the mgmt_pending_tx idr_remove() operation is not adequately protected by locking mechanisms, potentially leading to race conditions. The fix involves freeing the allocated memory during both completion and cleanup phases and protecting the critical section with a data lock (ar->data_lock) to prevent concurrent access issues. The vulnerability was tested on hardware WCN3990 hw1.0 and is relevant to Linux kernel versions containing the specified commit hashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of resource exhaustion on Linux systems utilizing affected Qualcomm Atheros Wi-Fi chipsets with the ath10k driver. Memory leaks can degrade system performance over time, potentially leading to denial of service (DoS) conditions if the leaked memory accumulates sufficiently to exhaust kernel memory pools. This can affect critical infrastructure, enterprise servers, embedded devices, and network equipment running Linux with these drivers. Although the vulnerability does not directly allow code execution or privilege escalation, the resulting instability and DoS can disrupt business operations, especially in environments relying on wireless connectivity for critical communications. Organizations with large-scale deployments of Linux-based wireless access points, IoT devices, or network appliances using affected hardware are at higher risk. The concurrency issue could also lead to unpredictable behavior or crashes under high network load. Given the widespread use of Linux in European IT infrastructure and the prevalence of Qualcomm Atheros chipsets in wireless devices, the impact could be significant if left unpatched, particularly in sectors such as telecommunications, manufacturing, and public services.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions that include the patch for CVE-2024-50236 as soon as it becomes available. Since the vulnerability is in the ath10k driver, organizations should audit their hardware inventory to identify devices using Qualcomm Atheros chipsets managed by this driver. For embedded or specialized devices where kernel updates are less frequent, consider applying vendor-supplied firmware or driver patches. Network administrators should monitor systems for signs of memory leaks or unusual resource consumption related to wireless management traffic. Implementing kernel memory leak detection tools like kmemleak can help identify affected systems proactively. Additionally, organizations should enforce strict access controls and network segmentation to limit exposure of vulnerable devices to untrusted networks, reducing the risk of exploitation through crafted management frames. Where feasible, temporarily disabling wireless interfaces or switching to alternative drivers/hardware until patches are applied can mitigate risk. Finally, maintain up-to-date incident response plans to address potential denial of service scenarios caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.975Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdf5e4

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 1:12:27 PM

Last updated: 8/12/2025, 4:58:43 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats