Executive Summary

Informations
Name CVE-2024-50236 First vendor Publication 2024-11-09
Vendor Cve Last vendor Modification 2024-11-14

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: Fix memory leak in management tx

In the current logic, memory is allocated for storing the MSDU context during management packet TX but this memory is not being freed during management TX completion. Similar leaks are seen in the management TX cleanup logic.

Kmemleak reports this problem as below,

unreferenced object 0xffffff80b64ed250 (size 16):
comm "kworker/u16:7", pid 148, jiffies 4294687130 (age 714.199s)
hex dump (first 16 bytes):
00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00 .+.......t......
backtrace:
[] __kmem_cache_alloc_node+0x1e4/0x2d8
[] kmalloc_trace+0x48/0x110
[] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core]
[] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core]
[] process_scheduled_works+0x1ac/0x400
[] worker_thread+0x208/0x328
[] kthread+0x100/0x1c0
[] ret_from_fork+0x10/0x20

Free the memory during completion and cleanup to fix the leak.

Protect the mgmt_pending_tx idr_remove() operation in ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar->data_lock similar to other instances.

Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50236

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3642

Sources (Detail)

https://git.kernel.org/stable/c/2f6f1e26ac6d2b38e2198a71f81f0ade14d6b07b
https://git.kernel.org/stable/c/4112450da7d67b59ccedc2208bae622db17dbcb8
https://git.kernel.org/stable/c/5f5a939759c79e7385946c85e62feca51a18d816
https://git.kernel.org/stable/c/6cc23898e6ba47e976050d3c080b4d2c1add3748
https://git.kernel.org/stable/c/6fc9af3df6ca7f3c94774d20f62dc7b49616026d
https://git.kernel.org/stable/c/705be2dc45c7f852e211e16bc41a916fab741983
https://git.kernel.org/stable/c/e15d84b3bba187aa372dff7c58ce1fd5cb48a076
https://git.kernel.org/stable/c/eff818238bedb9c2484c251ec46f9f160911cdc0
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2024-11-23 00:22:56
  • Multiple Updates
2024-11-22 00:22:54
  • Multiple Updates
2024-11-20 00:20:41
  • Multiple Updates
2024-11-14 21:20:58
  • Multiple Updates
2024-11-12 21:16:51
  • Multiple Updates
2024-11-09 17:27:29
  • First insertion