CVE-2024-42246
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket<br />
<br />
When using a BPF program on kernel_connect(), the call can return -EPERM. This<br />
causes xs_tcp_setup_socket() to loop forever, filling up the syslog and causing<br />
the kernel to potentially freeze up.<br />
<br />
Neil suggested:<br />
<br />
This will propagate -EPERM up into other layers which might not be ready<br />
to handle it. It might be safer to map EPERM to an error we would be more<br />
likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.<br />
<br />
ECONNREFUSED as error seems reasonable. For programs setting a different error<br />
can be out of reach (see handling in 4fbac77d2d09) in particular on kernels<br />
which do not have f10d05966196 ("bpf: Make BPF_PROG_RUN_ARRAY return -err<br />
instead of allow boolean"), thus given that it is better to simply remap for<br />
consistent behavior. UDP does handle EPERM in xs_udp_send_request().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.17 (including) | 6.1.100 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.41 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.10 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/02ee1976edb21a96ce8e3fd4ef563f14cc16d041
- https://git.kernel.org/stable/c/5d8254e012996cee1a0f9cc920531cb7e4d9a011
- https://git.kernel.org/stable/c/626dfed5fa3bfb41e0dffd796032b555b69f9cde
- https://git.kernel.org/stable/c/934247ea65bc5eca8bdb7f8c0ddc15cef992a5d6
- https://git.kernel.org/stable/c/bc790261218952635f846aaf90bcc0974f6f62c6
- https://git.kernel.org/stable/c/d6c686c01c5f12ff8f7264e0ddf71df6cb0d4414
- https://git.kernel.org/stable/c/f2431e7db0fe0daccb2f06bb0d23740affcd2fa6
- https://git.kernel.org/stable/c/f388cfd913a2b96c05339a335f365795db1b36b6
- https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



