DEBIAN-CVE-2024-35882

Source
https://security-tracker.debian.org/tracker/CVE-2024-35882
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-35882.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-35882
Upstream
Published
2024-05-19T09:15:09Z
Modified
2025-09-19T06:11:49Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix a slow server-side memory leak with RPC-over-TCP Jan Schunk reports that his small NFS servers suffer from memory exhaustion after just a few days. A bisect shows that commit e18e157bb5c8 ("SUNRPC: Send RPC message on TCP with a single socksendmsg() call") is the first bad commit. That commit assumed that socksendmsg() releases all the pages in the underlying biovec array, but the reality is that it doesn't. svcxprt_release() releases the rqst's response pages, but the record marker page fragment isn't one of those, so it is never released. This is a narrow fix that can be applied to stable kernels. A more extensive fix is in the works.

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}