CVE-2024-53175
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ipc: fix memleak if msg_init_ns failed in create_ipc_ns<br />
<br />
Percpu memory allocation may failed during create_ipc_ns however this<br />
fail is not handled properly since ipc sysctls and mq sysctls is not<br />
released properly. Fix this by release these two resource when failure.<br />
<br />
Here is the kmemleak stack when percpu failed:<br />
<br />
unreferenced object 0xffff88819de2a600 (size 512):<br />
comm "shmem_2nstest", pid 120711, jiffies 4300542254<br />
hex dump (first 32 bytes):<br />
60 aa 9d 84 ff ff ff ff fc 18 48 b2 84 88 ff ff `.........H.....<br />
04 00 00 00 a4 01 00 00 20 e4 56 81 ff ff ff ff ........ .V.....<br />
backtrace (crc be7cba35):<br />
[] __kmalloc_node_track_caller_noprof+0x333/0x420<br />
[] kmemdup_noprof+0x26/0x50<br />
[] setup_mq_sysctls+0x57/0x1d0<br />
[] copy_ipcs+0x29c/0x3b0<br />
[] create_new_namespaces+0x1d0/0x920<br />
[] copy_namespaces+0x2e9/0x3e0<br />
[] copy_process+0x29f3/0x7ff0<br />
[] kernel_clone+0xc0/0x650<br />
[] __do_sys_clone+0xa1/0xe0<br />
[] do_syscall_64+0xbf/0x1c0<br />
[] entry_SYSCALL_64_after_hwframe+0x4b/0x53
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/10209665b5bf199f8065b2e7d2b2dc6cdf227117
- https://git.kernel.org/stable/c/3d230cfd4b9b0558c7b2039ba1def2ce6b6cd158
- https://git.kernel.org/stable/c/8fed302872e26c7bf44d855c53a1cde747172d58
- https://git.kernel.org/stable/c/928de5fcd462498b8334107035da8ab85e316d8a
- https://git.kernel.org/stable/c/bc8f5921cd69188627c08041276238de222ab466
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



