U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-41068 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Fix sclp_init() cleanup on failure If sclp_init() fails it only partially cleans up: if there are multiple failing calls to sclp_init() sclp_state_change_event will be added several times to sclp_reg_list, which results in the following warning: ------------[ cut here ]------------ list_add double add: new=000003ffe1598c10, prev=000003ffe1598bf0, next=000003ffe1598c10. WARNING: CPU: 0 PID: 1 at lib/list_debug.c:35 __list_add_valid_or_report+0xde/0xf8 CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.10.0-rc3 Krnl PSW : 0404c00180000000 000003ffe0d6076a (__list_add_valid_or_report+0xe2/0xf8) R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 ... Call Trace: [<000003ffe0d6076a>] __list_add_valid_or_report+0xe2/0xf8 ([<000003ffe0d60766>] __list_add_valid_or_report+0xde/0xf8) [<000003ffe0a8d37e>] sclp_init+0x40e/0x450 [<000003ffe00009f2>] do_one_initcall+0x42/0x1e0 [<000003ffe15b77a6>] do_initcalls+0x126/0x150 [<000003ffe15b7a0a>] kernel_init_freeable+0x1ba/0x1f8 [<000003ffe0d6650e>] kernel_init+0x2e/0x180 [<000003ffe000301c>] __ret_from_fork+0x3c/0x60 [<000003ffe0d759ca>] ret_from_fork+0xa/0x30 Fix this by removing sclp_state_change_event from sclp_reg_list when sclp_init() fails.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0a31b3fdc7e735c4f8c65fe4339945c717ed6808
https://git.kernel.org/stable/c/0a31b3fdc7e735c4f8c65fe4339945c717ed6808
https://git.kernel.org/stable/c/2e51db7ab71b89dc5a17068f5e201c69f13a4c9a
https://git.kernel.org/stable/c/2e51db7ab71b89dc5a17068f5e201c69f13a4c9a
https://git.kernel.org/stable/c/455a6653d8700a81aa8ed2b6442a3be476007090
https://git.kernel.org/stable/c/455a6653d8700a81aa8ed2b6442a3be476007090
https://git.kernel.org/stable/c/6434b33faaa063df500af355ee6c3942e0f8d982
https://git.kernel.org/stable/c/6434b33faaa063df500af355ee6c3942e0f8d982
https://git.kernel.org/stable/c/79b4be70d5a160969b805f638ac5b4efd0aac7a3
https://git.kernel.org/stable/c/79b4be70d5a160969b805f638ac5b4efd0aac7a3
https://git.kernel.org/stable/c/a778987afc36d5dc02a1f82d352a81edcaf7eb83
https://git.kernel.org/stable/c/a778987afc36d5dc02a1f82d352a81edcaf7eb83
https://git.kernel.org/stable/c/be0259796d0b76bbc7461e12c186814a9e58244c
https://git.kernel.org/stable/c/be0259796d0b76bbc7461e12c186814a9e58244c
https://git.kernel.org/stable/c/cf521049fcd07071ed42dc9758fce7d5ee120ec6
https://git.kernel.org/stable/c/cf521049fcd07071ed42dc9758fce7d5ee120ec6

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-41068
NVD Published Date:
07/29/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org