CVE-2024-41068

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41068
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41068.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-41068
Downstream
Related
Published
2024-07-29T14:57:29.360Z
Modified
2025-11-28T02:35:03.897846Z
Summary
s390/sclp: Fix sclp_init() cleanup on failure
Details

In the Linux kernel, the following vulnerability has been resolved:

s390/sclp: Fix sclp_init() cleanup on failure

If sclpinit() fails it only partially cleans up: if there are multiple failing calls to sclpinit() sclpstatechangeevent will be added several times to sclpreg_list, which results in the following warning:

------------[ cut here ]------------ listadd double add: new=000003ffe1598c10, prev=000003ffe1598bf0, next=000003ffe1598c10. WARNING: CPU: 0 PID: 1 at lib/listdebug.c:35 listaddvalidorreport+0xde/0xf8 CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.10.0-rc3 Krnl PSW : 0404c00180000000 000003ffe0d6076a (listaddvalidorreport+0xe2/0xf8) R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 ... Call Trace: [<000003ffe0d6076a>] _listaddvalidorreport+0xe2/0xf8 ([<000003ffe0d60766>] _listaddvalidorreport+0xde/0xf8) [<000003ffe0a8d37e>] sclpinit+0x40e/0x450 [<000003ffe00009f2>] dooneinitcall+0x42/0x1e0 [<000003ffe15b77a6>] doinitcalls+0x126/0x150 [<000003ffe15b7a0a>] kernelinitfreeable+0x1ba/0x1f8 [<000003ffe0d6650e>] kernelinit+0x2e/0x180 [<000003ffe000301c>] _retfromfork+0x3c/0x60 [<000003ffe0d759ca>] retfromfork+0xa/0x30

Fix this by removing sclpstatechangeevent from sclpreglist when sclpinit() fails.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/41xxx/CVE-2024-41068.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
a778987afc36d5dc02a1f82d352a81edcaf7eb83
Fixed
455a6653d8700a81aa8ed2b6442a3be476007090
Fixed
2e51db7ab71b89dc5a17068f5e201c69f13a4c9a
Fixed
cf521049fcd07071ed42dc9758fce7d5ee120ec6
Fixed
79b4be70d5a160969b805f638ac5b4efd0aac7a3
Fixed
0a31b3fdc7e735c4f8c65fe4339945c717ed6808
Fixed
be0259796d0b76bbc7461e12c186814a9e58244c
Fixed
6434b33faaa063df500af355ee6c3942e0f8d982

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.319
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.281
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.223
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.164
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.101
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.42
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.9.11