CVE-2024-50168

In the Linux kernel, the following vulnerability has been resolved: net/sun3_82586: fix potential memory leak in sun3_82586_send_packet() The sun3_82586_send_packet() returns NETDEV_TX_OK without freeing skb in case of skb->len being too long, add dev_kfree_skb() to fix it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*

History

13 Nov 2024, 16:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/137010d26dc5cd47cd62fef77cbe952d31951b7a - () https://git.kernel.org/stable/c/137010d26dc5cd47cd62fef77cbe952d31951b7a - Patch
References () https://git.kernel.org/stable/c/1a17a4ac2d57102497fac53b53c666dba6a0c20d - () https://git.kernel.org/stable/c/1a17a4ac2d57102497fac53b53c666dba6a0c20d - Patch
References () https://git.kernel.org/stable/c/2cb3f56e827abb22c4168ad0c1bbbf401bb2f3b8 - () https://git.kernel.org/stable/c/2cb3f56e827abb22c4168ad0c1bbbf401bb2f3b8 - Patch
References () https://git.kernel.org/stable/c/6dc937a3086e344f965ca5c459f8f3eb6b68d890 - () https://git.kernel.org/stable/c/6dc937a3086e344f965ca5c459f8f3eb6b68d890 - Patch
References () https://git.kernel.org/stable/c/84f2bac74000dbb7a177d9b98a17031ec8d07ec5 - () https://git.kernel.org/stable/c/84f2bac74000dbb7a177d9b98a17031ec8d07ec5 - Patch
References () https://git.kernel.org/stable/c/8d5b20fbc548650019afa96822b6a33ea4ec8aa5 - () https://git.kernel.org/stable/c/8d5b20fbc548650019afa96822b6a33ea4ec8aa5 - Patch
References () https://git.kernel.org/stable/c/9c6ce55e6f0bd1541f112833006b4052614c7d94 - () https://git.kernel.org/stable/c/9c6ce55e6f0bd1541f112833006b4052614c7d94 - Patch
References () https://git.kernel.org/stable/c/db755e55349045375c5c7036e8650afb3ff419d8 - () https://git.kernel.org/stable/c/db755e55349045375c5c7036e8650afb3ff419d8 - Patch
CWE CWE-401

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/137010d26dc5cd47cd62fef77cbe952d31951b7a -
  • () https://git.kernel.org/stable/c/8d5b20fbc548650019afa96822b6a33ea4ec8aa5 -
  • () https://git.kernel.org/stable/c/db755e55349045375c5c7036e8650afb3ff419d8 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sun3_82586: corrige una posible pérdida de memoria en sun3_82586_send_packet(). sun3_82586_send_packet() devuelve NETDEV_TX_OK sin liberar skb en caso de que skb->len sea demasiado largo, agrega dev_kfree_skb() para solucionarlo.

07 Nov 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-07 10:15

Updated : 2024-11-13 16:16


NVD link : CVE-2024-50168

Mitre link : CVE-2024-50168

CVE.ORG link : CVE-2024-50168


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime