CVE-2024-53210
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct()<br />
<br />
Passing MSG_PEEK flag to skb_recv_datagram() increments skb refcount<br />
(skb->users) and iucv_sock_recvmsg() does not decrement skb refcount<br />
at exit.<br />
This results in skb memory leak in skb_queue_purge() and WARN_ON in<br />
iucv_sock_destruct() during socket close. To fix this decrease<br />
skb refcount by one if MSG_PEEK is set in order to prevent memory<br />
leak and WARN_ON.<br />
<br />
WARNING: CPU: 2 PID: 6292 at net/iucv/af_iucv.c:286 iucv_sock_destruct+0x144/0x1a0 [af_iucv]<br />
CPU: 2 PID: 6292 Comm: afiucv_test_msg Kdump: loaded Tainted: G W 6.10.0-rc7 #1<br />
Hardware name: IBM 3931 A01 704 (z/VM 7.3.0)<br />
Call Trace:<br />
[] iucv_sock_destruct+0x148/0x1a0 [af_iucv]<br />
[] iucv_sock_destruct+0x80/0x1a0 [af_iucv]<br />
[] __sk_destruct+0x52/0x550<br />
[] __sock_release+0xa4/0x230<br />
[] sock_close+0x2c/0x40<br />
[] __fput+0x2e8/0x970<br />
[] task_work_run+0x1c4/0x2c0<br />
[] do_exit+0x996/0x1050<br />
[] do_group_exit+0x13a/0x360<br />
[] __s390x_sys_exit_group+0x56/0x60<br />
[] do_syscall+0x27a/0x380<br />
[] __do_syscall+0x9c/0x160<br />
[] system_call+0x70/0x98<br />
Last Breaking-Event-Address:<br />
[] iucv_sock_destruct+0x84/0x1a0 [af_iucv]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.21 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/42251c2d1ef1cb0822638bebb87ad9120c759673
- https://git.kernel.org/stable/c/783c2c6e61c5a04eb8baea598753d5fa174dbe85
- https://git.kernel.org/stable/c/934326aef7ac4652f81c69d18bf44eebaefc39c3
- https://git.kernel.org/stable/c/9f603e66e1c59c1d25e60eb0636cb307d190782e
- https://git.kernel.org/stable/c/ebaf81317e42aa990ad20b113cfe3a7b20d4e937
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



