CVE-2024-53210

Source
https://cve.org/CVERecord?id=CVE-2024-53210
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53210.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53210
Downstream
Related
Published
2024-12-27T13:49:56.183Z
Modified
2026-03-11T07:46:37.449916Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct()
Details

In the Linux kernel, the following vulnerability has been resolved:

s390/iucv: MSGPEEK causes memory leak in iucvsock_destruct()

Passing MSGPEEK flag to skbrecvdatagram() increments skb refcount (skb->users) and iucvsockrecvmsg() does not decrement skb refcount at exit. This results in skb memory leak in skbqueuepurge() and WARNON in iucvsockdestruct() during socket close. To fix this decrease skb refcount by one if MSGPEEK is set in order to prevent memory leak and WARNON.

WARNING: CPU: 2 PID: 6292 at net/iucv/afiucv.c:286 iucvsockdestruct+0x144/0x1a0 [afiucv] CPU: 2 PID: 6292 Comm: afiucvtestmsg Kdump: loaded Tainted: G W 6.10.0-rc7 #1 Hardware name: IBM 3931 A01 704 (z/VM 7.3.0) Call Trace: [<001587c682c4aa98>] iucvsockdestruct+0x148/0x1a0 [afiucv] [<001587c682c4a9d0>] iucvsockdestruct+0x80/0x1a0 [afiucv] [<001587c704117a32>] __sk_destruct+0x52/0x550 [<001587c704104a54>] __sockrelease+0xa4/0x230 [<001587c704104c0c>] sockclose+0x2c/0x40 [<001587c702c5f5a8>] __fput+0x2e8/0x970 [<001587c7024148c4>] taskworkrun+0x1c4/0x2c0 [<001587c7023b0716>] doexit+0x996/0x1050 [<001587c7023b13aa>] dogroup_exit+0x13a/0x360 [<001587c7023b1626>] __s390xsysexitgroup+0x56/0x60 [<001587c7022bccca>] dosyscall+0x27a/0x380 [<001587c7049a6a0c>] _dosyscall+0x9c/0x160 [<001587c7049ce8a8>] systemcall+0x70/0x98 Last Breaking-Event-Address: [<001587c682c4a9d4>] iucvsockdestruct+0x84/0x1a0 [afiucv]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53210.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
eac3731bd04c7131478722a3c148b78774553116
Fixed
934326aef7ac4652f81c69d18bf44eebaefc39c3
Fixed
42251c2d1ef1cb0822638bebb87ad9120c759673
Fixed
783c2c6e61c5a04eb8baea598753d5fa174dbe85
Fixed
9f603e66e1c59c1d25e60eb0636cb307d190782e
Fixed
ebaf81317e42aa990ad20b113cfe3a7b20d4e937

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53210.json"