CVE-2024-58053 (GCVE-0-2024-58053)
Vulnerability from cvelistv5
Published
2025-03-06 15:53
Modified
2025-05-04 10:08
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix handling of received connection abort Fix the handling of a connection abort that we've received. Though the abort is at the connection level, it needs propagating to the calls on that connection. Whilst the propagation bit is performed, the calls aren't then woken up to go and process their termination, and as no further input is forthcoming, they just hang. Also add some tracing for the logging of connection aborts.
Impacted products
Vendor Product Version
Linux Linux Version: 248f219cb8bcbfbd7f132752d44afa2df7c241d1
Version: 248f219cb8bcbfbd7f132752d44afa2df7c241d1
Version: 248f219cb8bcbfbd7f132752d44afa2df7c241d1
Version: 248f219cb8bcbfbd7f132752d44afa2df7c241d1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "include/trace/events/rxrpc.h",
            "net/rxrpc/conn_event.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "9c6702260557c0183d8417c79a37777a3d3e58e8",
              "status": "affected",
              "version": "248f219cb8bcbfbd7f132752d44afa2df7c241d1",
              "versionType": "git"
            },
            {
              "lessThan": "5842ce7b120c65624052a8da04460d35b26caac0",
              "status": "affected",
              "version": "248f219cb8bcbfbd7f132752d44afa2df7c241d1",
              "versionType": "git"
            },
            {
              "lessThan": "96d1d927c4d03ee9dcee7640bca70b74e63504fc",
              "status": "affected",
              "version": "248f219cb8bcbfbd7f132752d44afa2df7c241d1",
              "versionType": "git"
            },
            {
              "lessThan": "0e56ebde245e4799ce74d38419426f2a80d39950",
              "status": "affected",
              "version": "248f219cb8bcbfbd7f132752d44afa2df7c241d1",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "include/trace/events/rxrpc.h",
            "net/rxrpc/conn_event.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.9"
            },
            {
              "lessThan": "4.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.76",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.13.*",
              "status": "unaffected",
              "version": "6.13.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.14",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.76",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.13",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13.2",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14",
                  "versionStartIncluding": "4.9",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix handling of received connection abort\n\nFix the handling of a connection abort that we\u0027ve received.  Though the\nabort is at the connection level, it needs propagating to the calls on that\nconnection.  Whilst the propagation bit is performed, the calls aren\u0027t then\nwoken up to go and process their termination, and as no further input is\nforthcoming, they just hang.\n\nAlso add some tracing for the logging of connection aborts."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T10:08:46.815Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/9c6702260557c0183d8417c79a37777a3d3e58e8"
        },
        {
          "url": "https://git.kernel.org/stable/c/5842ce7b120c65624052a8da04460d35b26caac0"
        },
        {
          "url": "https://git.kernel.org/stable/c/96d1d927c4d03ee9dcee7640bca70b74e63504fc"
        },
        {
          "url": "https://git.kernel.org/stable/c/0e56ebde245e4799ce74d38419426f2a80d39950"
        }
      ],
      "title": "rxrpc: Fix handling of received connection abort",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-58053",
    "datePublished": "2025-03-06T15:53:57.558Z",
    "dateReserved": "2025-03-06T15:52:09.178Z",
    "dateUpdated": "2025-05-04T10:08:46.815Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-58053\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-03-06T16:15:51.490\",\"lastModified\":\"2025-03-06T16:15:51.490\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nrxrpc: Fix handling of received connection abort\\n\\nFix the handling of a connection abort that we\u0027ve received.  Though the\\nabort is at the connection level, it needs propagating to the calls on that\\nconnection.  Whilst the propagation bit is performed, the calls aren\u0027t then\\nwoken up to go and process their termination, and as no further input is\\nforthcoming, they just hang.\\n\\nAlso add some tracing for the logging of connection aborts.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rxrpc: Se ha corregido la gesti\u00f3n de la interrupci\u00f3n de la conexi\u00f3n recibida Se ha corregido la gesti\u00f3n de una interrupci\u00f3n de la conexi\u00f3n que hemos recibido. Aunque la interrupci\u00f3n se produce a nivel de conexi\u00f3n, es necesario propagarla a las llamadas de esa conexi\u00f3n. Mientras se realiza el bit de propagaci\u00f3n, las llamadas no se activan para procesar su finalizaci\u00f3n y, como no se recibe ninguna otra entrada, simplemente se cuelgan. Tambi\u00e9n se ha a\u00f1adido alg\u00fan seguimiento para el registro de las interrupciones de la conexi\u00f3n.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0e56ebde245e4799ce74d38419426f2a80d39950\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5842ce7b120c65624052a8da04460d35b26caac0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/96d1d927c4d03ee9dcee7640bca70b74e63504fc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9c6702260557c0183d8417c79a37777a3d3e58e8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…