We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50171

net: systemport: fix potential memory leak in bcm_sysport_xmit()



Description

In the Linux kernel, the following vulnerability has been resolved: net: systemport: fix potential memory leak in bcm_sysport_xmit() The bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb in case of dma_map_single() fails, add dev_kfree_skb() to fix it.

Reserved 2024-10-21 | Published 2024-11-07 | Updated 2024-11-19 | Assigner Linux

Product status

Default status
unaffected

80105befdb4b before 8e81ce7d0166
affected

80105befdb4b before 31701ef0c454
affected

80105befdb4b before b6321146773d
affected

80105befdb4b before 5febfc545389
affected

80105befdb4b before 533d2f30aef2
affected

80105befdb4b before 4b70478b984a
affected

80105befdb4b before 7d5030a819c3
affected

80105befdb4b before c401ed1c7099
affected

Default status
affected

3.16
affected

Any version before 3.16
unaffected

4.19.323
unaffected

5.4.285
unaffected

5.10.229
unaffected

5.15.170
unaffected

6.1.115
unaffected

6.6.59
unaffected

6.11.6
unaffected

6.12
unaffected

References

git.kernel.org/...c/8e81ce7d0166a2249deb6d5e42f28a8b8c9ea72f

git.kernel.org/...c/31701ef0c4547973991ff63596c927f841dfd133

git.kernel.org/...c/b6321146773dcbbc372a54dbada67e0b50e0a25c

git.kernel.org/...c/5febfc545389805ce83d37f9f4317055b26dd7d7

git.kernel.org/...c/533d2f30aef272dade17870a509521c3afc38a03

git.kernel.org/...c/4b70478b984af3c9d0279c121df5ff94e2533dbd

git.kernel.org/...c/7d5030a819c3589cf9948b1eee397b626ec590f5

git.kernel.org/...c/c401ed1c709948e57945485088413e1bb5e94bd1

cve.org (CVE-2024-50171)

nvd.nist.gov (CVE-2024-50171)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50171

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.