In the Linux kernel, the following vulnerability has been resolved:
net: bcmasp: fix potential memory leak in bcmasp_xmit()
The bcmaspxmit() returns NETDEVTXOK without freeing skb in case of mapping fails, add devkfree_skb() to fix it.
[
    {
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f689f20d3e09f2d4d0a2c575a9859115a33e68bd",
        "digest": {
            "function_hash": "144179389336947128484936066006635312738",
            "length": 2239.0
        },
        "target": {
            "function": "bcmasp_xmit",
            "file": "drivers/net/ethernet/broadcom/asp2/bcmasp_intf.c"
        },
        "id": "CVE-2024-50170-067acef5",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fed07d3eb8a8d9fcc0e455175a89bc6445d6faed",
        "digest": {
            "function_hash": "144179389336947128484936066006635312738",
            "length": 2239.0
        },
        "target": {
            "function": "bcmasp_xmit",
            "file": "drivers/net/ethernet/broadcom/asp2/bcmasp_intf.c"
        },
        "id": "CVE-2024-50170-27295612",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7218de0778aefbbbcfe474a55f88bbf6f244627d",
        "digest": {
            "function_hash": "144179389336947128484936066006635312738",
            "length": 2239.0
        },
        "target": {
            "function": "bcmasp_xmit",
            "file": "drivers/net/ethernet/broadcom/asp2/bcmasp_intf.c"
        },
        "id": "CVE-2024-50170-2e1d54f4",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7218de0778aefbbbcfe474a55f88bbf6f244627d",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "42346781018818709841734352166329874704",
                "85919178236763789201578376989565338781",
                "24669972335250578958178456627148355086",
                "306798099777357075343864574205025847941"
            ]
        },
        "target": {
            "file": "drivers/net/ethernet/broadcom/asp2/bcmasp_intf.c"
        },
        "id": "CVE-2024-50170-5015bb42",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f689f20d3e09f2d4d0a2c575a9859115a33e68bd",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "42346781018818709841734352166329874704",
                "85919178236763789201578376989565338781",
                "24669972335250578958178456627148355086",
                "306798099777357075343864574205025847941"
            ]
        },
        "target": {
            "file": "drivers/net/ethernet/broadcom/asp2/bcmasp_intf.c"
        },
        "id": "CVE-2024-50170-aa325e09",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fed07d3eb8a8d9fcc0e455175a89bc6445d6faed",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "42346781018818709841734352166329874704",
                "85919178236763789201578376989565338781",
                "24669972335250578958178456627148355086",
                "306798099777357075343864574205025847941"
            ]
        },
        "target": {
            "file": "drivers/net/ethernet/broadcom/asp2/bcmasp_intf.c"
        },
        "id": "CVE-2024-50170-ac544130",
        "deprecated": false,
        "signature_type": "Line"
    }
]