CVE-2024-53215
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()<br />
<br />
There&#39;s issue as follows:<br />
RPC: Registered rdma transport module.<br />
RPC: Registered rdma backchannel transport module.<br />
RPC: Unregistered rdma transport module.<br />
RPC: Unregistered rdma backchannel transport module.<br />
BUG: unable to handle page fault for address: fffffbfff80c609a<br />
PGD 123fee067 P4D 123fee067 PUD 123fea067 PMD 10c624067 PTE 0<br />
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI<br />
RIP: 0010:percpu_counter_destroy_many+0xf7/0x2a0<br />
Call Trace:<br />
<br />
__die+0x1f/0x70<br />
page_fault_oops+0x2cd/0x860<br />
spurious_kernel_fault+0x36/0x450<br />
do_kern_addr_fault+0xca/0x100<br />
exc_page_fault+0x128/0x150<br />
asm_exc_page_fault+0x26/0x30<br />
percpu_counter_destroy_many+0xf7/0x2a0<br />
mmdrop+0x209/0x350<br />
finish_task_switch.isra.0+0x481/0x840<br />
schedule_tail+0xe/0xd0<br />
ret_from_fork+0x23/0x80<br />
ret_from_fork_asm+0x1a/0x30<br />
<br />
<br />
If register_sysctl() return NULL, then svc_rdma_proc_cleanup() will not<br />
destroy the percpu counters which init in svc_rdma_proc_init().<br />
If CONFIG_HOTPLUG_CPU is enabled, residual nodes may be in the<br />
&#39;percpu_counters&#39; list. The above issue may occur once the module is<br />
removed. If the CONFIG_HOTPLUG_CPU configuration is not enabled, memory<br />
leakage occurs.<br />
To solve above issue just destroy all percpu counters when<br />
register_sysctl() return NULL.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.15.174 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1c9a99c89e45b22eb556fd2f3f729f2683f247d5
- https://git.kernel.org/stable/c/20322edcbad82a60321a8615a99ca73a9611115f
- https://git.kernel.org/stable/c/94d2d6d398706ab7218a26d61e12919c4b498e09
- https://git.kernel.org/stable/c/a12c897adf40b6e2b4a56e6912380c31bd7b2479
- https://git.kernel.org/stable/c/ce89e742a4c12b20f09a43fec1b21db33f2166cd
- https://git.kernel.org/stable/c/ebf47215d46992caea660ec01cd618005d9e687a
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



