CVE-2024-41068
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/07/2024
Last modified:
05/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
s390/sclp: Fix sclp_init() cleanup on failure<br />
<br />
If sclp_init() fails it only partially cleans up: if there are multiple<br />
failing calls to sclp_init() sclp_state_change_event will be added several<br />
times to sclp_reg_list, which results in the following warning:<br />
<br />
------------[ cut here ]------------<br />
list_add double add: new=000003ffe1598c10, prev=000003ffe1598bf0, next=000003ffe1598c10.<br />
WARNING: CPU: 0 PID: 1 at lib/list_debug.c:35 __list_add_valid_or_report+0xde/0xf8<br />
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.10.0-rc3<br />
Krnl PSW : 0404c00180000000 000003ffe0d6076a (__list_add_valid_or_report+0xe2/0xf8)<br />
R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3<br />
...<br />
Call Trace:<br />
[] __list_add_valid_or_report+0xe2/0xf8<br />
([] __list_add_valid_or_report+0xde/0xf8)<br />
[] sclp_init+0x40e/0x450<br />
[] do_one_initcall+0x42/0x1e0<br />
[] do_initcalls+0x126/0x150<br />
[] kernel_init_freeable+0x1ba/0x1f8<br />
[] kernel_init+0x2e/0x180<br />
[] __ret_from_fork+0x3c/0x60<br />
[] ret_from_fork+0xa/0x30<br />
<br />
Fix this by removing sclp_state_change_event from sclp_reg_list when<br />
sclp_init() fails.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.319 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.281 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.223 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.164 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.101 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0a31b3fdc7e735c4f8c65fe4339945c717ed6808
- https://git.kernel.org/stable/c/6434b33faaa063df500af355ee6c3942e0f8d982
- https://git.kernel.org/stable/c/79b4be70d5a160969b805f638ac5b4efd0aac7a3
- https://git.kernel.org/stable/c/be0259796d0b76bbc7461e12c186814a9e58244c
- https://git.kernel.org/stable/c/cf521049fcd07071ed42dc9758fce7d5ee120ec6
- https://git.kernel.org/stable/c/0a31b3fdc7e735c4f8c65fe4339945c717ed6808
- https://git.kernel.org/stable/c/2e51db7ab71b89dc5a17068f5e201c69f13a4c9a
- https://git.kernel.org/stable/c/455a6653d8700a81aa8ed2b6442a3be476007090
- https://git.kernel.org/stable/c/6434b33faaa063df500af355ee6c3942e0f8d982
- https://git.kernel.org/stable/c/79b4be70d5a160969b805f638ac5b4efd0aac7a3
- https://git.kernel.org/stable/c/a778987afc36d5dc02a1f82d352a81edcaf7eb83
- https://git.kernel.org/stable/c/be0259796d0b76bbc7461e12c186814a9e58244c
- https://git.kernel.org/stable/c/cf521049fcd07071ed42dc9758fce7d5ee120ec6
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



