First published: Thu Nov 07 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: be2net: fix potential memory leak in be_xmit() The be_xmit() returns NETDEV_TX_OK without freeing skb in case of be_xmit_enqueue() fails, add dev_kfree_skb_any() to fix it.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.2<4.19.323 | |
Linux Kernel | >=4.20<5.4.285 | |
Linux Kernel | >=5.5<5.10.229 | |
Linux Kernel | >=5.11<5.15.170 | |
Linux Kernel | >=5.16<6.1.115 | |
Linux Kernel | >=6.2<6.6.59 | |
Linux Kernel | >=6.7<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50167 has a moderate severity level due to a potential memory leak in the be_xmit function.
To fix CVE-2024-50167, upgrade to a patched version of the Linux kernel that addresses the memory leak issue.
CVE-2024-50167 affects Linux kernel versions ranging from 4.2 to 6.12-rc4.
Currently, there are no known effective workarounds for CVE-2024-50167 other than updating to a secure version of the kernel.
CVE-2024-50167 impacts the be2net component within the Linux kernel.