CVE-2024-56643
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dccp: Fix memory leak in dccp_feat_change_recv<br />
<br />
If dccp_feat_push_confirm() fails after new value for SP feature was accepted<br />
without reconciliation (&#39;entry == NULL&#39; branch), memory allocated for that value<br />
with dccp_feat_clone_sp_val() is never freed.<br />
<br />
Here is the kmemleak stack for this:<br />
<br />
unreferenced object 0xffff88801d4ab488 (size 8):<br />
comm "syz-executor310", pid 1127, jiffies 4295085598 (age 41.666s)<br />
hex dump (first 8 bytes):<br />
01 b4 4a 1d 80 88 ff ff ..J.....<br />
backtrace:<br />
[] kmemdup+0x23/0x50 mm/util.c:128<br />
[] kmemdup include/linux/string.h:465 [inline]<br />
[] dccp_feat_clone_sp_val net/dccp/feat.c:371 [inline]<br />
[] dccp_feat_clone_sp_val net/dccp/feat.c:367 [inline]<br />
[] dccp_feat_change_recv net/dccp/feat.c:1145 [inline]<br />
[] dccp_feat_parse_options+0x1196/0x2180 net/dccp/feat.c:1416<br />
[] dccp_parse_options+0xa2a/0x1260 net/dccp/options.c:125<br />
[] dccp_rcv_state_process+0x197/0x13d0 net/dccp/input.c:650<br />
[] dccp_v4_do_rcv+0xf9/0x1a0 net/dccp/ipv4.c:688<br />
[] sk_backlog_rcv include/net/sock.h:1041 [inline]<br />
[] __release_sock+0x139/0x3b0 net/core/sock.c:2570<br />
[] release_sock+0x54/0x1b0 net/core/sock.c:3111<br />
[] inet_wait_for_connect net/ipv4/af_inet.c:603 [inline]<br />
[] __inet_stream_connect+0x5d0/0xf70 net/ipv4/af_inet.c:696<br />
[] inet_stream_connect+0x53/0xa0 net/ipv4/af_inet.c:735<br />
[] __sys_connect_file+0x15c/0x1a0 net/socket.c:1865<br />
[] __sys_connect+0x165/0x1a0 net/socket.c:1882<br />
[] __do_sys_connect net/socket.c:1892 [inline]<br />
[] __se_sys_connect net/socket.c:1889 [inline]<br />
[] __x64_sys_connect+0x6e/0xb0 net/socket.c:1889<br />
[] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46<br />
[] entry_SYSCALL_64_after_hwframe+0x67/0xd1<br />
<br />
Clean up the allocated memory in case of dccp_feat_push_confirm() failure<br />
and bail out with an error reset code.<br />
<br />
Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.29 (including) | 5.4.287 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.231 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.174 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.66 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/22be4727a8f898442066bcac34f8a1ad0bc72e14
- https://git.kernel.org/stable/c/623be080ab3c13d71570bd32f7202a8efa8e2252
- https://git.kernel.org/stable/c/6ff67909ee2ffad911e3122616df41dee23ff4f6
- https://git.kernel.org/stable/c/9ee68b0f23706a77f53c832457b9384178b76421
- https://git.kernel.org/stable/c/bc3d4423def1a9412a0ae454cb4477089ab79276
- https://git.kernel.org/stable/c/c99507fff94b926fc92279c92d80f229c91cb85d
- https://git.kernel.org/stable/c/d3ec686a369fae5034303061f003cd3f94ddfd23
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



